Browse Results

Showing 53,726 through 53,750 of 54,380 results

Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities: Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) (EAI/Springer Innovations in Communication and Computing)

by Ahmed A. Abd El-Latif Lo’ai Tawalbeh Yassine Maleh Brij B. Gupta

This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing. The primary focus of the book addresses security mechanisms in IoT and edge/ fog computing, advanced secure deployments for large scaled edge/ fog computing, and new efficient data security strategy of IoT and edge/ fog computing. The book lays a foundation of the core concepts and principles of IoT and 5G security, walking the reader through the fundamental ideas. This book is aimed at researchers, graduate students, and engineers in the fields of secure IoT and edge/ fog computing. The book also presents selected papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022).

Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies (Engineering Cyber-Physical Systems and Critical Infrastructures #4)

by Ahmed A. Abd El-Latif Yassine Maleh Wojciech Mazurczyk Mohammed ELAffendi Mohamed I. Alkanhal

This book gathers the proceedings of the International conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies, held on May 10–11, 2022, in Riyadh, Saudi Arabia. The conference organized by the College of Computer Science of Prince Sultan University, Saudi Arabia. This book provides an opportunity to account for state-of-the-art works, future trends impacting cybersecurity, cybercrimes, and smart emerging technologies, that concern to organizations and individuals, thus creating new research opportunities, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well as practitioners. CCSET 2022 was devoted to advances in cybersecurity, cybercime, and smart emerging technologies. It was considered a meeting point for researchers and practitioners to implement advanced information technologies into various industries. There were 89 paper submissions from 25 countries. Each submission was reviewed by at least three chairs or PC members and 26 regular papers (30%) were accepted. Unfortunately, due to limitations of conference topics and edited volumes, the Program Committee was forced to reject some interesting papers, which did not satisfy these topics or publisher requirements.

Distributed Real-Time Architecture for Mixed-Criticality Systems

by Hamidreza Ahmadian Roman Obermaisser Jon Perez

This book describes a cross-domain architecture and design tools for networked complex systems where application subsystems of different criticality coexist and interact on networked multi-core chips. The architecture leverages multi-core platforms for a hierarchical system perspective of mixed-criticality applications. This system perspective is realized by virtualization to establish security, safety and real-time performance. The impact further includes a reduction of time-to-market, decreased development, deployment and maintenance cost, and the exploitation of the economies of scale through cross-domain components and tools. Describes an end-to-end architecture for hypervisor-level, chip-level, and cluster level. Offers a solution for different types of resources including processors, on-chip communication, off-chip communication, and I/O. Provides a cross-domain approach with examples for wind-power, health-care, and avionics. Introduces hierarchical adaptation strategies for mixed-criticality systems Provides modular verification and certification methods for the seamless integration of mixed-criticality systems. Covers platform technologies, along with a methodology for the development process. Presents an experimental evaluation of technological results in cooperation with industrial partners. The information in this book will be extremely useful to industry leaders who design and manufacture products with distributed embedded systems in mixed-criticality use-cases. It will also benefit suppliers of embedded components or development tools used in this area. As an educational tool, this material can be used to teach students and working professionals in areas including embedded systems, computer networks, system architecture, dependability, real-time systems, and avionics, wind-power and health-care systems.

Soft Computing Approach for Mathematical Modeling of Engineering Problems

by Ali Ahmadian

This book describes different mathematical modeling and soft computing techniques used to solve practical engineering problems. It gives an overview of the current state of soft computing techniques and describes the advantages and disadvantages of soft computing compared to traditional hard computing techniques. Through examples and case studies the editors demonstrate and describe how problems with inherent uncertainty can be addressed and eventually solved through the aid of numerical models and methods. The chapters address several applications and examples in bioengineering science, drug delivery, solving inventory issues, Industry 4.0, augmented reality and weather forecasting. Other examples include solving fuzzy-shortest-path problems by introducing a new distance and ranking functions. Because, in practice, problems arise with uncertain data and most of them cannot be solved exactly and easily, the main objective is to develop models that deliver solutions with the aid of numerical methods. This is the reason behind investigating soft numerical computing in dynamic systems. Having this in mind, the authors and editors have considered error of approximation and have discussed several common types of errors and their propagations. Moreover, they have explained the numerical methods, along with convergence and consistence properties and characteristics, as the main objectives behind this book involve considering, discussing and proving related theorems within the setting of soft computing. This book examines dynamic models, and how time is fundamental to the structure of the model and data as well as the understanding of how a process unfolds • Discusses mathematical modeling with soft computing and the implementations of uncertain mathematical models • Examines how uncertain dynamic systems models include uncertain state, uncertain state space and uncertain state’s transition functions • Assists readers to become familiar with many soft numerical methods to simulate the solution function’s behaviorThis book is intended for system specialists who are interested in dynamic systems that operate at different time scales. The book can be used by engineering students, researchers and professionals in control and finite element fields as well as all engineering, applied mathematics, economics and computer science interested in dynamic and uncertain systems. Ali Ahmadian is a Senior Lecturer at the Institute of IR 4.0, The National University of Malaysia.Soheil Salahshour is an associate professor at Bahcesehir University.

Graphs in Biomedical Image Analysis, and Overlapped Cell on Tissue Dataset for Histopathology: 5th MICCAI Workshop, GRAIL 2023 and 1st MICCAI Challenge, OCELOT 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, September 23, and October 4, 2023, Proceedings (Lecture Notes in Computer Science #14373)

by Seyed-Ahmad Ahmadi Sérgio Pereira

This LNCS conference volume constitutes the proceedings of the MICCAI Workshop GRAIL 2023 and MICCAI Challenge OCELOT 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, September 23, and October 4, 2023. The 9 full papers (GRAIL 2023) and 6 full papers (OCELOT 2023) included in this volume were carefully reviewed and selected from GRAIL 14 (GRAIL 2023) and 6 (OCELOT 2023) submissions. The conference GRAIL 2023 a wide set of methods and application and OCELOT 2023 focuses on the cover a wide range of methods utilizing tissue information for better cell detection, in the sense of training strategy, model architecture, and especially how to model cell-tissue relationships.

Girl Gone Viral

by Arvin Ahmadi

Perfect for fans of Warcross and Black Mirror, Girl Gone Viral is the inventive and timely story of a seventeen-year-old coder's catapult to stardom.For seventeen-year-old Opal Hopper, code is magic. She builds entire worlds from scratch: Mars craters, shimmering lakes, any virtual experience her heart desires. But she can't code her dad back into her life. When he disappeared after her tenth birthday, leaving only a cryptic note, Opal tried desperately to find him. And when he never turned up, she enrolled at a boarding school for technical prodigies and tried to forget.Until now. Because WAVE, the world's biggest virtual reality platform, has announced a contest where the winner gets to meet its billionaire founder. The same billionaire who worked closely with Opal's dad. The one she always believed might know where he went. The one who maybe even murdered him.What begins as a small data hack to win the contest spirals out of control when Opal goes viral, digging her deeper into a hole of lies, hacks, and manipulation. How far will Opal go for the answers--or is it the attention--she's wanted for years?

International Congress and Workshop on Industrial AI 2021 (Lecture Notes in Mechanical Engineering)

by Alireza Ahmadi Ramin Karim Iman Soleimanmeigouni Ravdeep Kour Raj Rao

This proceedings of the International Congress and Workshop on Industrial AI 2021 encompasses and integrates the themes and topics of three conferences, eMaintenance, Condition Monitoring and Diagnostic Engineering management (COMADEM), and Advances in Reliability, Maintainability and Supportability (ARMS) into a single resource. The 21st century is witnessing the emerging extensive applications of Artificial Intelligence (AI) and Information Technologies (IT) in industry. Industrial Artificial Intelligence (IAI) integrates IT with Operational Technologies (OT) and Engineering Technologies (ET) to achieve operational excellence through enhanced analytics in operation and maintenance of industrial assets. This volume provides insight into opportunities and challenges caused by the implementation of AI in industries apart from future developments with special reference to operation and maintenance of industrial assets. Industry practitioners in the maintenance field as well as academics seeking applied research in maintenance will find this text useful.

Advances in Computational Intelligence and Its Applications

by Sheikh Fahad Ahmad Shadab Siddiqui Rajib Debnath Kakali Das Figlu Mohanty Sumit Hazra

It is with great pleasure and enthusiasm that we welcome you to the International Conference on Advances in Computational Intelligence and its Applications (ICACIA-2023). In the ever-evolving landscape of technology, computational intelligence stands as a cornerstone, shaping the future of diverse fields and industries. This conference serves as a nexus for researchers, academicians, and industry experts to converge, exchange ideas, and explore the latest advancements in the realm of computational intelligence.

Proceedings of the 12th International Conference on Robotics, Vision, Signal Processing and Power Applications (Lecture Notes in Electrical Engineering #1123)

by Nur Syazreen Ahmad Junita Mohamad-Saleh Jiashen Teh

This book presents selected papers from the Proceedings of the International Conference 12th International Conference on Robotics, Vision, Signal Processing, and Power Applications ROVISP 2023, held in Penang, Malaysia, covering topic areas divided into the following tracks: (1) Robotics, Control, Mechatronics, and Automation; (2) Vision, Image and Signal Processing; (3) Telecommunication Systems and Applications; (4) Electronic Design and Applications; (5) Electrical Power, Energy, and Industrial Applications. Its content highlights state-of-the-art technologies adopted by the relevant industries which appeal to researchers and industrial practitioners working in the field.

Predicting Real World Behaviors from Virtual World Data

by Muhammad Aurangzeb Ahmad Cuihua Shen Jaideep Srivastava Noshir Contractor

There is a growing body of literature that focuses on the similarities and differences between how people behave in the offline world vs. how they behave in these virtual environments. Data mining has aided in discovering interesting insights with respect to how people behave in these virtual environments. The book addresses prediction, mining and analysis of offline characteristics and behaviors from online data and vice versa. Each chapter will focus on a different aspect of virtual worlds to real world prediction e. g. , demographics, personality, location, etc.

Proceedings of International Conference on Information and Communication Technology for Development: ICICTD 2022 (Studies in Autonomic, Data-driven and Industrial Computing)

by Mohiuddin Ahmad Mohammad Shorif Uddin Yeong Min Jang

This book gathers outstanding research papers presented at the International Conference on Information and Communication Technology for Development (ICICTD 2022), held on July 29–30, 2022, at the Institute of Information and Communication Technology (IICT), Khulna University of Engineering & Technology (KUET), Khulna, Bangladesh. The topics covered are ICT in health care, ICT in e-commerce, e-governance, collective intelligence, soft computing, optimization, cloud computing, machine learning, intelligent software, robotics, data science, data security, big data analytics and IoT, information systems, computer network, algorithms, and natural language processing.

Affective Computing and Sentiment Analysis: Emotion, Metaphor and Terminology (Text, Speech and Language Technology #45)

by Khurshid Ahmad

This volume maps the watershed areas between two 'holy grails' of computer science: the identification and interpretation of affect - including sentiment and mood. The expression of sentiment and mood involves the use of metaphors, especially in emotive situations. Affect computing is rooted in hermeneutics, philosophy, political science and sociology, and is now a key area of research in computer science. The 24/7 news sites and blogs facilitate the expression and shaping of opinion locally and globally. Sentiment analysis, based on text and data mining, is being used in the looking at news and blogs for purposes as diverse as: brand management, film reviews, financial market analysis and prediction, homeland security. There are systems that learn how sentiments are articulated. This work draws on, and informs, research in fields as varied as artificial intelligence, especially reasoning and machine learning, corpus-based information extraction, linguistics, and psychology.

Software Security: Concepts & Practices

by Suhel Ahmad Khan Rajeev Kumar Raees Ahmad Khan

Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.

Opportunistic Networks: Mobility Models, Protocols, Security, and Privacy

by Khaleel Ahmad Nur Izura Udzir Ganesh Chandra Deka

Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.

Emerging Security Algorithms and Techniques

by Khaleel Ahmad M. N. Doja Nur Izura Udzir Manu Pratap Singh

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission. Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption. There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc. The book offers comprehensive coverage of the most essential topics, including: Modular Arithmetic, Finite Fields Prime Number, DLP, Integer Factorization Problem Symmetric Cryptography Asymmetric Cryptography Post-Quantum Cryptography Identity Based Encryption Attribute Based Encryption Key Management Entity Authentication, Message Authentication Digital Signatures Hands-On "SageMath" This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

40 Algorithms Every Programmer Should Know: Hone Your Problem-solving Skills By Learning Different Algorithms And Their Implementation In Python

by Imran Ahmad

This book is for anyone who wants to understand essential algorithms and their implementation. Whether you are an experienced programmer who wants to gain a deeper understanding of the math behind the algorithms, or have limited data science and programming knowledge and want to learn more about this important area of active research and application, you’ll find this book useful. Although experience with Python programming is a must, knowledge of data science will be helpful but not necessary.

40 Algorithms Every Programmer Should Know - Second Edition: Tackle Computer Science Challenges With Classic To Modern Algorithms In Machine Learning, Software Design, Data Systems, And Cryptography

by Imran Ahmad

This computer science book is for programmers or developers who want to understand the use of algorithms for problem-solving and writing efficient code. Whether you are a beginner looking to learn the most used algorithms concisely or an experienced programmer looking to explore cutting-edge algorithms in data science, machine learning, and cryptography, you'll find this book useful. Python programming experience is a must, knowledge of data science will be helpful but not necessary.

Recent Trends in Mechatronics Towards Industry 4.0: Selected Articles from iM3F 2020, Malaysia (Lecture Notes in Electrical Engineering #730)

by Ahmad Fakhri Ab. Nasir Ahmad Najmuddin Ibrahim Ismayuzri Ishak Nafrizuan Mat Yahya Muhammad Aizzat Zakaria Anwar P. P. Abdul Majeed

This book presents part of the iM3F 2020 proceedings from the Mechatronics track. It highlights key challenges and recent trends in mechatronics engineering and technology that are non-trivial in the age of Industry 4.0. It discusses traditional as well as modern solutions that are employed in the multitude spectra of mechatronics-based applications. The readers are expected to gain an insightful view on the current trends, issues, mitigating factors as well as solutions from this book.

From Internet of Things to Smart Cities: Enabling Technologies (Chapman & Hall/CRC Computer and Information Science Series)

by Bashar Ahmad Hongjian Sun Chao Wang

From Internet of Things to Smart Cities: Enabling Technologies explores the information and communication technologies (ICT) needed to enable real-time responses to current environmental, technological, societal, and economic challenges. ICT technologies can be utilized to help with reducing carbon emissions, improving resource utilization efficiency, promoting active engagement of citizens, and more. This book aims to introduce the latest ICT technologies and to promote international collaborations across the scientific community, and eventually, the general public. It consists of three tightly coupled parts. The first part explores the involvement of enabling technologies from basic machine-to-machine communications to Internet of Things technologies. The second part of the book focuses on state of the art data analytics and security techniques, and the last part of the book discusses the design of human-machine interfaces, including smart home and cities. Features Provides an extended literature review of relevant technologies, in addition to detailed comparison diagrams, making new readers be easier to grasp fundamental and wide knowledge Contains the most recent research results in the field of communications, signal processing and computing sciences for facilitating smart homes, buildings, and cities Includes future research directions in Internet of Things, smart homes, smart buildings, smart grid, and smart cities Presents real examples of applying these enabling technologies to smart homes, transportation systems and cities With contributions from leading experts, the book follows an easy structure that not only presents timely research topics in-depth, but also integrates them into real world applications to help readers to better understand them.

Proceedings of the International Conference on Computing, Mathematics and Statistics (iCMS #2015)

by Abd-Razak Ahmad Liew Kee Kor Illiasaak Ahmad Zanariah Idrus

This proceedings volume consists of refereed papers presented at the Second International Conference on Computing, Mathematics and Statistics (iCMS 2015) held in Langkawi, Malaysia in November 2015. Divided into three sections - Computer Science, Mathematics and Statistics - the book includes both quantitative and qualitative research that confronts current societal issues. Within the main sections, the book also covers education based research works and the applications of computer and mathematical sciences in social science, business, industries and the life and hard sciences. Drawing on the theme Bridging Research Endeavor on Computing, Mathematics and Statistics, each of the conference papers are carefully selected and edited to cater to readers from diverse applied and social sciences backgrounds. The book allows for the contemplation and reflection on the possibility of the knowledge growth and knowledge sharing in building a better world for future generations.

Hiding Data - Selected Topics

by Rudolf Ahlswedealexander Ahlswede Ingo Althöfer Christian Deppe Ulrich Tamm

Devoted to information security, this volume begins with a short course on cryptography, mainly basedon lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid1990s. It was the second of his cycle of lectures on information theory whichopened with an introductory course on basic coding theorems, as covered inVolume 1 of this series. In this third volume, Shannon's historical work onsecrecy systems is detailed, followed by an introduction to aninformation-theoretic model of wiretap channels, and such important concepts ashomophonic coding and authentication. Once the theoretical arguments have beenpresented, comprehensive technical details of AES are given. Furthermore, ashort introduction to the history of public-key cryptology, RSA and El Gamalcryptosystems is provided, followed by a look at the basic theory of ellipticcurves, and algorithms for efficient addition in elliptic curves. Lastly, theimportant topic of "oblivious transfer" is discussed, which is stronglyconnected to the privacy problem in communication. Today, the importance ofthis problem is rapidly increasing, and further research and practical realizationsare greatly anticipated. This is the third of several volumes serving as thecollected documentation of Rudolf Ahlswede's lectures on information theory. Each volume includes comments from an invited well-known expert. In thesupplement to the present volume, Rüdiger Reischuk contributes his insights. Classicalinformation processing concerns the main tasks of gaining knowledge and thestorage, transmission and hiding of data. The first task is the prime goal ofStatistics. For transmission and hiding data, Shannon developed an impressivemathematical theory called Information Theory, which he based on probabilisticmodels. The theory largely involves the concept of codes with small errorprobabilities in spite of noise in the transmission, which is modeled bychannels. The lectures presented in this work are suitable for graduatestudents in Mathematics, and also for those working in Theoretical ComputerScience, Physics, and Electrical Engineering with a background in basicMathematics. The lectures can be used as the basis for courses or to supplementcourses in many ways. Ph. D. students will also find research problems, oftenwith conjectures, that offer potential subjects for a thesis. More advancedresearchers may find questions which form the basis of entire researchprograms.

Storing and Transmitting Data

by Rudolf Ahlswedealexander Ahlswede Ingo Althöfer Christian Deppe Ulrich Tamm

The volume "Storing and Transmitting Data" is based on Rudolf Ahlswede's introductory course on "Information Theory I" and presents an introduction to Shannon Theory. Readers, familiar or unfamiliar with the technical intricacies of Information Theory, will benefit considerably from working through the book; especially Chapter VI with its lively comments and uncensored insider views from the world of science and research offers informative and revealing insights. This is the first of several volumes that will serve as a collected research documentation of Rudolf Ahlswede's lectures on information theory. Each volume includes comments from an invited well-known expert. Holger Boche contributed his insights in the supplement of the present volume. Classical information processing concerns the main tasks of gaining knowledge, storage, transmitting and hiding data. The first task is the prime goal of Statistics. For the two next, Shannon presented an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presented in this work are suitable for graduate students in Mathematics, and also in Theoretical Computer Science, Physics, and Electrical Engineering with background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph. D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find the basis of entire research programs.

Transmitting and Gaining Data

by Rudolf Ahlswedealexander Ahlswede Ingo Althöfer Christian Deppe Ulrich Tamm

The calculation of channel capacities was one of Rudolf Ahlswede's specialties and is the main topic of this second volume of his Lectures on Information Theory. Here we find a detailed account of some very classical material from the early days of Information Theory, including developments from the USA, Russia, Hungary and (which Ahlswede was probably in a unique position to describe) the German school centered around his supervisor Konrad Jacobs. These lectures made an approach to a rigorous justification of the foundations of Information Theory. This is the second of several volumes documenting Rudolf Ahlswede's lectures on Information Theory. Each volume includes comments from an invited well-known expert. In the supplement to the present volume, Gerhard Kramer contributes his insights. Classical information processing concerns the main tasks of gaining knowledge and the storage, transmission and hiding of data. The first task is the prime goal of Statistics. For transmission and hiding data, Shannon developed an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presented in this work are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph. D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs.

Probabilistic Methods and Distributed Information: Rudolf Ahlswede’s Lectures on Information Theory 5 (Foundations in Signal Processing, Communications and Networking #15)

by Rudolf Ahlswede Alexander Ahlswede Ingo Althöfer Christian Deppe Vladimir Blinovsky Ulrich Tamm Holger Boche Ulrich Krengel Ahmed Mansour

The fifth volume of Rudolf Ahlswede’s lectures on Information Theory focuses on several problems that were at the heart of a lot of his research. One of the highlights of the entire lecture note series is surely Part I of this volume on arbitrarily varying channels (AVC), a subject in which Ahlswede was probably the world's leading expert. Appended to Part I is a survey by Holger Boche and Ahmed Mansour on recent results concerning AVC and arbitrarily varying wiretap channels (AVWC). After a short Part II on continuous data compression, Part III, the longest part of the book, is devoted to distributed information. This Part includes discussions on a variety of related topics; among them let us emphasize two which are famously associated with Ahlswede: "multiple descriptions", on which he produced some of the best research worldwide, and "network coding", which had Ahlswede among the authors of its pioneering paper. The final Part IV on "Statistical Inference under Communication constraints" is mainly based on Ahlswede’s joint paper with Imre Csiszar, which received the Best Paper Award of the IEEE Information Theory Society. The lectures presented in this work, which consists of 10 volumes, are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used either as the basis for courses or to supplement them in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs.

Handelsmarketing: Grundlagen Der Marktorientierten Führung Von Handelsbetrieben (Springer-Lehrbuch)

by Dieter Ahlert Peter Kenning Christian Brock

Dieses Lehrbuch führt in die grundlegenden Konzepte, Methoden und Anwendungen der marktorientierten Führung von Handelsbetrieben ein. Die Autoren veranschaulichen diese anhand von Erkenntnissen aus der Forschung sowie Beispielen aus der Unternehmenspraxis. Leser und Leserinnen können sich so ein Basiswissen verschaffen, das ihnen auch den Zugang zu speziellen Teilgebieten des Handelsmarketing ermöglicht. Für die 2. Auflage wurden alle Kapitel überarbeitet und um Kontrollfragen erweitert. Die mit der Digitalisierung verbundenen Entwicklungen wurden in der zweiten Auflage systematisch integriert. Neue Kapitel zum Customer Relationship Management und Multikanalmanagement kommen hinzu.Der Inhalt• Grundlagen des Handelsmarketing• Informationsgrundlagen des Handelsmarketing• Ziele und Strategien• Die Betriebstypenpolitik• Markenpolitik im Handel• Die Standortpolitik• Die Sortimentspolitik• Die Personalpolitik• Die Preispolitik• Die Präsentationspolitik• Die Kommunikationspolitik• Customer Relationship Management im Handel• Multikanalmanagement• Handelscontrolling

Refine Search

Showing 53,726 through 53,750 of 54,380 results