Browse Results

Showing 54,151 through 54,175 of 54,282 results

Intelligent Techniques for Predictive Data Analytics

by Mohd Dilshad Ansari Shilpi Birla Neha Singh Neeraj Kumar Shukla

Comprehensive resource covering tools and techniques used for predictive analytics with practical applications across various industries Intelligent Techniques for Predictive Data Analytics provides an in-depth introduction of the tools and techniques used for predictive analytics, covering applications in cyber security, network security, data mining, and machine learning across various industries. Each chapter offers a brief introduction on the subject to make the text accessible regardless of background knowledge. Readers will gain a clear understanding of how to use data processing, classification, and analysis to support strategic decisions, such as optimizing marketing strategies and customer relationship management and recommendation systems, improving general business operations, and predicting occurrence of chronic diseases for better patient management. Traditional data analytics uses dashboards to illustrate trends and outliers, but with large data sets, this process is labor-intensive and time-consuming. This book provides everything readers need to save time by performing deep, efficient analysis without human bias and time constraints. A section on current challenges in the field is also included. Intelligent Techniques for Predictive Data Analytics covers sample topics such as: Models to choose from in predictive modeling, including classification, clustering, forecast, outlier, and time series models Price forecasting, quality optimization, and insect and disease plant and monitoring in agriculture Fraud detection and prevention, credit scoring, financial planning, and customer analytics Big data in smart grids, smart grid analytics, and predictive smart grid quality monitoring, maintenance, and load forecasting Management of uncertainty in predictive data analytics and probable future developments in the field Intelligent Techniques for Predictive Data Analytics is an essential resource on the subject for professionals and researchers working in data science or data management seeking to understand the different models of predictive analytics, along with graduate students studying data science courses and professionals and academics new to the field.

Artificial Intelligence Applications and Innovations. AIAI 2024 IFIP WG 12.5 International Workshops: MHDW 2024, 5G-PINE 2024, and ΑΙ4GD 2024, Corfu, Greece, June 27-30, 2024, Proceedings (IFIP Advances in Information and Communication Technology #715)

by Ioannis Karydis Lazaros Iliadis Ilias Maglogiannis Antonios Papaleonidas Ioannis Chochliouros

This book constitutes the refereed proceedings of three International Workshops held as parallel events of the IFIP WG 12.5 International Workshops on Artificial Intelligence Applications and Innovations, AIAI 2024, held in Corfu, Greece, during June 27-30, 2024. The 30 full papers and 4 short papers presented in this book were carefully reviewed and selected from 69 submissions. AIAI 2024 Workshop volume presents papers from the following three workshops: 13th event of the International Mining Humanistic Data Workshop (MHDW 2024) 9th 5G-PINE Workshop (5G-PINE 2024) 1st Workshop on AI Applications for Achieving the Green Deal Targets (ΑΙ4GD 2024).

Understanding Atmospheric Rivers Using Machine Learning (SpringerBriefs in Applied Sciences and Technology)

by Manish Kumar Goyal Shivam Singh

This book delves into the characterization, impacts, drivers, and predictability of atmospheric rivers (AR). It begins with the historical background and mechanisms governing AR formation, giving insights into the global and regional perspectives of ARs, observing their varying manifestations across different geographical contexts. The book explores the key characteristics of ARs, from their frequency and duration to intensity, unraveling the intricate relationship between atmospheric rivers and precipitation. The book also focus on the intersection of ARs with large-scale climate oscillations, such as El Niño and La Niña events, the North Atlantic Oscillation (NAO), and the Pacific Decadal Oscillation (PDO). The chapters help understand how these climate phenomena influence AR behavior, offering a nuanced perspective on climate modeling and prediction. The book also covers artificial intelligence (AI) applications, from pattern recognition to prediction modeling and early warning systems. A case study on AR prediction using deep learning models exemplifies the practical applications of AI in this domain. The book culminates by underscoring the interdisciplinary nature of AR research and the synergy between atmospheric science, climatology, and artificial intelligence

Spatial Cognition XIII: 13th International Conference, Spatial Cognition 2024, Dublin, Ireland, June 25–28, 2024, Proceedings (Lecture Notes in Computer Science #14756)

by Gavin Duffy Marija Živković Jeffrey Buckley Marianna Pagkratidou

This book constitutes the proceedings of the 13th International Conference, Spatial Cognition 2024, held in Dublin, Ireland, during June 25 - 29, 2024. The 9 full papers were carefully reviewed and selected from 12 submissions. The papers are organized in topical sections as follows: Mathematics; Gender Differences; STEAM (Science, Technology, Engineering, Art, and Mathematics); and Early Childhood.

Advances on P2P, Parallel, Grid, Cloud and Internet Computing: Proceedings of the 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2018) (Lecture Notes on Data Engineering and Communications Technologies #24)

by Fatos Xhafa Fang-Yie Leu Massimo Ficco Chao-Tung Yang

This book presents the latest research findings, as well as innovative theoretical and practical research results, methods and development techniques related to P2P, grid, cloud and Internet computing. It also reveals the synergies among such large scale computing paradigms. P2P, Grid, Cloud and Internet computing technologies have rapidly become established as breakthrough paradigms for solving complex problems by enabling aggregation and sharing of an increasing variety of distributed computational resources on a large scale. Grid computing originated as a paradigm for high-performance computing, offering an alternative to expensive supercomputers through different forms of large-scale distributed computing. P2P computing emerged as a new paradigm following on from client-server and web-based computing and has proved useful in the development of social networking, B2B (Business to Business), B2C (Business to Consumer), B2G (Business to Government), and B2E (Business to Employee). Cloud computing has been described as a “computing paradigm where the boundaries of computing are determined by economic rationale rather than technical limits”. Cloud computing has fast become the computing paradigm with applicability and adoption in all domains and providing utility computing at large scale. Lastly, Internet computing is the basis of any large-scale distributed computing paradigm; it has very quickly developed into a vast and flourishing field with enormous impact on today’s information societies and serving as a universal platform comprising a large variety of computing forms such as grid, P2P, cloud and mobile computing.

Blockchain Technology and Application: 6th CCF China Blockchain Summit, CBCS 2023, Haikou, China, December 15–18, 2023, Revised Selected Papers (Communications in Computer and Information Science #2098)

by Jianming Zhu Xianhua Song Zeguang Lu Yong Ding Qianhong Wu

This book constitutes the refereed proceedings of the 6th CCF China Blockchain Summit, CBCS 2023, held in Haikou, China, in December 2023. The 13 revised full papers presented were carefully reviewed and selected from 72 submissions. The papers deal with research results and development activities in all aspects of blockchain science and technology.

Computer Science – CACIC 2023: 29th Argentine Congress of Computer Science, Lujan, Argentina, October 9–12, 2023, Revised Selected Papers (Communications in Computer and Information Science #2123)

by Juan Manuel Fernández Patricia Pesado Walter Panessi

This book constitutes the refereed proceedings of the 29th Argentine Congress of Computer Science on Computer Science - CACIC 2023, held in Luján, Argentina, during October 9–12, 2023. The 27 full papers included in this book were carefully reviewed and selected from 142 submissions. They were organized in topical sections as follows: agents and systems; distributed and parallel processing; technology applied to education; graphic computation, images and visualization; software engineering; databases and data mining; hardware architectures, networks, and operating systems; innovation in software systems; signal processing and real-time systems; innovation in computer science education; computer security; digital governance and smart cities.

Combinatorial Optimization: 8th International Symposium, ISCO 2024, La Laguna, Tenerife, Spain, May 22–24, 2024, Revised Selected Papers (Lecture Notes in Computer Science #14594)

by Amitabh Basu Ali Ridha Mahjoub Juan José Salazar González

This book constitutes the refereed proceedings of the 8th International Symposium on Combinatorial Optimization, ISCO 2024, held in La Laguna, Tenerife, Spain, during May 22–24, 2024. The 30 full papers included in this book were carefully reviewed and selected from 46 submissions. They were organized in topical sections as follows: integer programming; graph theory; parameterized algorithms; approximation algorithms; integer programming for machine learning; and applications.

Human Digital Twin: Exploring Connectivity and Security Issues (SpringerBriefs in Computer Science)

by Changyan Yi Jun Cai Samuel D. Okegbile

Human digital twin (HDT) is a transformative technology poised to transform various human-centric systems. With its potential applications in personalized healthcare, HDT promises swift, precise, and efficient healthcare services through the integration of cutting-edge technologies such as artificial intelligence, data analytics, internet of things, cybersecurity as well as virtual and augmented reality. This book addresses the critical gap in the existing literature by offering a comprehensive exploration of connectivity solutions for HDT while prioritizing reliability, security, and privacy. Key topics covered include the foundational concept of HDT, its design requirements and associated challenges, edge-assisted human-to-virtual solutions, blockchain-enabled data-sharing mechanisms, and differentially private federated multi-task learning (DPFML) methodologies tailored for HDT.The discussion on the concept of HDT encompasses an overview of its applications and its specific characteristics when compared to the conventional digital twin models. In addressing the design requirements and challenges of HDT, the text delves into the complexities of securing high-quality data, ensuring ultra-reliable and low-latency communication, data privacy and integrity, while managing storage, computation and analytics. Exploring edge-assisted human-to-virtual solutions, the book also introduces a connectivity framework and details the modeling process for human-to-virtual twin connectivity. The book later presents an in-depth examination of the practical Byzantine fault tolerance framework, followed by a discussion on shard-based Byzantine fault-tolerant schemes tailored for HDT, along with analyses of latency and throughput.Furthermore, the book outlines the framework for DPFML-assisted human-to-virtual twin connectivity, accompanied by a novel consensus algorithm known as the proof of model quality. Finally, it presents future research directions aimed at addressing communication challenges hindering the seamless design and development of HDT. By offering this comprehensive exploration, the book serves as a valuable resource for researchers, practitioners, and policymakers seeking to navigate the evolving landscape of HDT and its transformative potential in various domains.

Moral und künstliche Intelligenz im Marketing (Beiträge zur empirischen Marketing- und Vertriebsforschung)

by Robin Pade

Konsumentendaten lassen sich zunehmend effektiv mit künstlicher Intelligenz (KI) kombinieren, um die Online Journey kalkuliert zu beeinflussen. Dieses Buch befasst sich anhand dreier Forschungsarbeiten mit den Fragen wann Marketing-KI Konsumentenentscheidungen vielmehr manipuliert als bereichert und wie Marketing-KI infolgedessen moralischer gestaltet werden kann. Die erste Forschungsarbeit untersucht, inwieweit Manipulationswahrnehmungen vom Menschenbild des Konsumenten abhängen. Hierfür werden zwei Studien mit 1.151 Teilnehmern durchgeführt. Daran anknüpfend stellt sich die Frage, ob Manager Konsumentenbilder auf opportunistische Weise instrumentalisieren, um Marketingaktivitäten zu legitimieren. Die zweite Forschungsarbeit kombiniert daher Methoden der Ökonometrie und des Natural Language Processing, um Menschenbilder von Managern aus Textdaten (33.407 Earnings Call Transkripte) zu analysieren. Die dritte Forschungsarbeit möchte Marketing-KI moralischer gestalten. Hierfür werden neuronale Netze mithilfe psychografischer Daten von 762 Teilnehmern trainiert, um faire personalisierte Preise anzubieten und Reaktionen mittels Laborexperiment (203 Probanden) zu untersuchen.

Structural Information and Communication Complexity: 31st International Colloquium, SIROCCO 2024, Vietri sul Mare, Italy, May 27–29, 2024, Proceedings (Lecture Notes in Computer Science #14662)

by Yuval Emek

This book constitutes the refereed proceedings of the 31th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2024, held in Haifa, Israel in May 2024. The 24 full papers and 6 short papers presented in this book were carefully reviewed and selected from 49 submissions. SIROCCO is devoted to the study of the interplay between structural knowledge, communication, and computing in decentralized systems of multiple communicating entities. Special emphasis is given to innovative approaches leading to better understanding of the relationship between computing and communication.

Proceedings of 4th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications: ICMISC 2023 (Lecture Notes in Networks and Systems #873)

by Vinit Kumar Gunjan Jacek M. Zurada

The book is a collection of the best-selected research papers presented at the International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications (ICMISC 2023) held in September 2023 at the CMR Institute of Technology, Hyderabad, Telangana, India. This book will contain articles on current trends in machine learning, the internet of things, and smart city applications, emphasizing multi-disciplinary research in the area of artificial intelligence and cyberphysical systems. The book is a great resource for scientists, research scholars, and PG students to formulate their research ideas and find future directions in these areas. Further, this book serves as a reference work to understand the latest technologies used by practice engineers across the globe.

Mathematics and Computation in Music: 9th International Conference, MCM 2024, Coimbra, Portugal, June 18–21, 2024, Proceedings (Lecture Notes in Computer Science #14639)

by Thomas Noll Mariana Montiel Francisco Gómez Omar Costa Hamido José Luis Besada José Oliveira Martins

This book constitutes the refereed proceedings of the 9th International Conference on Mathematics and Computation in Music, MCM 2024, held in Coimbra, Portugal, during June 18–21, 2024. The 30 full papers and 9 short papers included in this book were carefully reviewed and selected from 45 submissions. They were organized in topical sections as follows: mathematical scale theory and tuning; rhythm analysis and rhythm generation; categorical and algebraic approaches to music; quantum music; theory and algorithms for melodic- harmonic analysis and generation; geometric approaches to musical algorithms and microtonality; fourier analysis for music; similarity and distance measures for music; short papers; communication-performances; and tribute to Yves Hellegouarch.

Human-Centered Design, Operation and Evaluation of Mobile Communications: 5th International Conference, MOBILE 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29–July 4, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14738)

by June Wei George Margetis

This book constitutes the refereed proceedings of the 5th International Conference on Design, Operation and Evaluation of Mobile Communications, MOBILE 2024, held as part of the 26th International Conference, HCI International 2024, which was held in Washington, DC, USA, during June 29-July 4, 2024. The total of 1271 papers and 309 posters included in the HCII 2024 proceedings was carefully reviewed and selected from 5108 submissions. The MOBILE 2024 proceedings were organized in the following topical sections: Part I: Mobile health and wellbeing; mobile applications, serious games and advanced interfaces; Part II: Mobile commerce, marketing and retail; mobile security, privacy, and safety; mobile user experience and design.

Human-Centered Design, Operation and Evaluation of Mobile Communications: 5th International Conference, MOBILE 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29–July 4, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14737)

by June Wei George Margetis

This book constitutes the refereed proceedings of the 5th International Conference on Design, Operation and Evaluation of Mobile Communications, MOBILE 2024, held as part of the 26th International Conference, HCI International 2024, which was held in Washington, DC, USA, during June 29-July 4, 2024. The total of 1271 papers and 309 posters included in the HCII 2024 proceedings was carefully reviewed and selected from 5108 submissions. The MOBILE 2024 proceedings were organized in the following topical sections: Part I: Mobile health and wellbeing; mobile applications, serious games and advanced interfaces; Part II: Mobile commerce, marketing and retail; mobile security, privacy, and safety; mobile user experience and design.

Artificial Intelligence in HCI: 5th International Conference, AI-HCI 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29 – July 4, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14734)

by Helmut Degen Stavroula Ntoa

The three-volume book set LNAI 14734, 14735, and 14736 constitutes the refereed proceedings of 5th International Conference on Artificial Intelligence in HCI, AI-HCI 2024, held as part of the 26th International Conference, HCI International 2024, which took place in Washington, DC, USA, during June 29-July 4, 2024. The total of 1271 papers and 309 posters included in the HCII 2024 proceedings was carefully reviewed and selected from 5108 submissions. The AI-HCI 2024 proceedings were organized in the following topical sections: Part I: Human-centered artificial intelligence; explainability and transparency; AI systems and frameworks in HCI; Part II: Ethical considerations and trust in AI; enhancing user experience through AI-driven technologies; AI in industry and operations; Part III: Large language models for enhanced interaction; advancing human-robot interaction through AI; AI applications for social impact and human wellbeing.

Getting Started with Pester 5: A Beginner's Guide

by Owen Heaume

Embark on a transformative journey into the world of Pester and elevate your PowerShell scripting to new heights of robustness, reliability, and efficiency. This comprehensive beginner's guide provides a hands-on approach to PowerShell testing using Pester, empowering you to enhance your code quality with confidence.The book starts with an introduction to Pester, the powerful testing and mocking framework for PowerShell. You'll gain a solid foundation by exploring Pester's fundamental building blocks. The book guides you through the phases of Pester, helping you write your initial Pester code. You will dive into topics such as tags, assertions with Should and parameter filters, and you will explore advanced techniques such as Test Drive and Test Registry.You will discover the art of mocking in Pester and master its advanced testing methodologies. You will gain insights into working without installed modules and seamlessly integrating Pester with Azure DevOps Pipeline for a streamlined testing process.After reading this book, you will have the knowledge and skills to initiate your own exploration into PowerShell testing with Pester. You will transform your scripts into reliable powerhouses, ensuring the resilience and quality of your PowerShell code.What Will You LearnBuilding blocks and phases of PesterWriting effective Pester testsAssertions, mocking, and advanced testing techniquesIntegration with Azure DevOpsTags, code coverageWho This Book Is ForPowerShell scripters and Pester Framework beginners

Combating Human Trafficking: A Multidisciplinary Approach

by Michael J. Palmiotto

Approaching the topic from a law enforcement perspective, this volume provides an unprecedented look at the investigation of human trafficking in America. Beginning with historical, sociological, and psychological perspectives, the book discusses how authorities can best conduct an investigation of trafficking. It reviews federal agencies responsible for confronting the problem, examines relevant laws and legal trends, and discusses law enforcement awareness and training. An ideal resource for police investigators, police training, and community outreach organizations, the book is also suitable as a college text for criminal justice courses.

Mobile Evolution: Insights on Connectivity and Service

by Sebastian Thalanany

This book presents insights, interpretations, concepts, and interdependent views-in the landscape of mobile connectivity and service-that emphasize the significance of a harmonious interplay, cooperation, and coalescing of a variety of interdisciplinary domains of science and art. Mobile Evolution: Insights on Connectivity and Service explores the forward-looking and enabling capabilities of mobile connectivity and service in the context of long term evolution (LTE) systems and multimedia services, as viewed through a lens of human experience. It provides information and guidelines pertaining to the strategies and technologies associated with the next-generation mobile ecosystem.

Culture and Trust in Technology-Driven Organizations

by Frances Alston

This book provides insight into the important role that culture and trust can play in the success of high-technology organizations. There has been little research to demonstrate a connection between organizational culture and trust. This book introduces a review of the literature and the result of an empirical study that investigated the relationship between mechanistic and organic cultures and the level of trust in technology-based organizations.

Piezoelectric Materials and Devices: Applications in Engineering and Medical Sciences

by M. S. Vijaya

Starting from the fundamentals, this book provides a concise yet complete treatment of piezoelectric materials, an important class of smart materials which are useful as both actuators and sensors. Including case studies, the text introduces different types of dielectric materials, describes the preparation and properties of various piezoelectric materials used in device applications, and presents various engineering and medical applications of piezoelectric materials. It also discusses in detail the design and virtual prototyping of piezoelectric devices using commercially available software tools like ANSYS and PAFEC.

Indoor Wayfinding and Navigation

by Hassan A. Karimi

Due to the widespread use of navigation systems for wayfinding and navigation in the outdoors, researchers have devoted their efforts in recent years to designing navigation systems that can be used indoors. This book is a comprehensive guide to designing and building indoor wayfinding and navigation systems. It covers all types of feasible sensors (for example, Wi-Fi, A-GPS), discussing the level of accuracy, the types of map data needed, the data sources, and the techniques for providing routes and directions within structures.

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet

by Ken Dunham Jim Melnick

Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of "botmasters". This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots. With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace - how criminals make money off of your computer - are also a focus of this exclusive book! With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer. Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively protect their own networks from such attacks.

Mobile Telemedicine: A Computing and Networking Perspective

by Yang Xiao Hui Chen

Advances in the area of wireless and mobile telemedicine to diagnose and treat patients have drawn growing attention from healthcare providers and recipients, industry, researchers, and governments.This volumeexamines computing and network dilemmas which arise from wireless and mobile telemedicine. Comprised of the contributions of many prominent international researchers, the book gives an overview of patient care and monitoring, discusses the use of telemedicine in cardiology and diabetes, analyzes security and privacy considerations, examines issues relating to networking support, and concludes with a section on the opportunities and challenges that are faced by those involved in this exciting technology.

Delivering Successful Projects with TSP(SM) and Six Sigma: A Practical Guide to Implementing Team Software Process(SM)

by Mukesh Jain

Delivering successful projects means the ability to produce high quality software within budget and on time-consistently, but when one mentions quality to software engineers or project managers, they talk about how impossible it is to eliminate defects from software. This assumption is passed on and on until it becomes accepted wisdom, with the power of a self-fulfilling prophecy. And when a project fails to arrive on time or up to standards, team members will turn on each other. The project got delayed because the engineers did a poor job in development or too much was promised upfront for this short of a timeline.In Delivering Successful Projects with TSPSM and Six Sigma: A Practical Guide to Implementing Team Software ProcessSM, you will learn how to effectively manage the development of a software project and deliver it in line with customer expectations. This refreshing volume -Offers real-world case studies about the author's experience at Microsoft successfully implementing TSP to achieve higher quality softwareEmpowers software developers to take responsibility for project managementExplains how Six Sigma and TSP combined can dramatically reduce software defectsBy applying these principles put forth by one of the most respected names in software development, your software team will learn how to function as a team and turn out products where zero defects and on-time delivery are the norm.

Refine Search

Showing 54,151 through 54,175 of 54,282 results