Browse Results

Showing 53,751 through 53,775 of 54,430 results

Innovations in Smart Cities Applications Edition 2: The Proceedings of the Third International Conference on Smart City Applications (Lecture Notes in Intelligent Transportation and Infrastructure)

by Mohamed Ben Ahmed Anouar Abdelhakim Boudhir Ali Younes

This book highlights cutting-edge research presented at the third installment of the International Conference on Smart City Applications (SCA2018), held in Tétouan, Morocco on October 10–11, 2018. It presents original research results, new ideas, and practical lessons learned that touch on all aspects of smart city applications. The respective papers share new and highly original results by leading experts on IoT, Big Data, and Cloud technologies, and address a broad range of key challenges in smart cities, including Smart Education and Intelligent Learning Systems, Smart Healthcare, Smart Building and Home Automation, Smart Environment and Smart Agriculture, Smart Economy and Digital Business, and Information Technologies and Computer Science, among others. In addition, various novel proposals regarding smart cities are discussed. Gathering peer-reviewed chapters written by prominent researchers from around the globe, the book offers an invaluable instructional and research tool for courses on computer and urban sciences; students and practitioners in computer science, information science, technology studies and urban management studies will find it particularly useful. Further, the book is an excellent reference guide for professionals and researchers working in mobility, education, governance, energy, the environment and computer sciences.

Innovations in Smart Cities Applications Edition 3: The Proceedings of the 4th International Conference on Smart City Applications (Lecture Notes in Intelligent Transportation and Infrastructure)

by Mohamed Ben Ahmed Anouar Abdelhakim Boudhir Domingos Santos Mohamed El Aroussi İsmail Rakıp Karas

This book highlights original research and recent advances in various fields related to smart cities and their applications. It gathers papers presented at the Fourth International Conference on Smart City Applications (SCA19), held on October 2–4, 2019, in Casablanca, Morocco. Bringing together contributions by prominent researchers from around the globe, the book offers an invaluable instructional and research tool for courses on computer science, electrical engineering, and urban sciences. It is also an excellent reference guide for professionals, researchers, and academics in the field of smart cities. This book covers topics including: • Smart Citizenship• Smart Education • Digital Business and Smart Governance • Smart Health Care • New Generation of Networks and Systems for Smart Cities • Smart Grids and Electrical Engineering • Smart Mobility • Smart Security • Sustainable Building • Sustainable Environment

Innovations in Smart Cities Applications Volume 7: The Proceedings of the 8th International Conference on Smart City Applications, Volume 2 (Lecture Notes in Networks and Systems #938)

by Mohamed Ben Ahmed Anouar Abdelhakim Boudhir Rani El Meouche İsmail Rakıp Karaș

Many cities in the developed world are undergoing a digital revolution, and have placed the "smart city" on their list of priorities. Smart cities use technological solutions such as Internet of Things, AI, 5G, Big Data, Cloud computing, Smart Grid, as well as all the emerging technologies of the digital era, to improve the management and efficiency of the urban environment. The aim is to make residents happier, healthier, smarter and more prosperous, and to make the city greener, cleaner, more sustainable, more responsible, more functional, more resilient, and more competitive. Enhanced by extensive research studies and carried out under the guidance of international scientific experts in the field. This book explores various papers related to smart cities, including digital twins, geo-smart information systems, education, healthcare, economy and digital business, building and home automation, environment and agriculture, and information technologies and computer science.

Innovations in Smart Cities and Applications: Proceedings Of The 2nd Mediterranean Symposium On Smart City Applications (Lecture Notes In Networks And Systems #37)

by Mohamed Ben Ahmed Anouar Abdelhakim Boudhir

This proceedings book showcases the latest research work presented at the Second Edition of the Mediterranean Symposium on Smart City Application (SCAMS 2017), which was held in Tangier, Morocco on October 15–27, 2017. It presents original research results, new ideas and practical development experiences that concentrate on both theory and practice. It includes papers from all areas of Smart City Applications, e.g. Smart Mobility, Big Data, Smart Grids, Smart Homes and Buildings, clouds, crowds, mashups, social networks, and security issues.The conference stimulated cutting-edge research discussions among pioneering researchers, scientists, industrial engineers, and students from all around the world. The topics covered in this book also focus on innovative issues at the international level by bringing together experts from different countries. The scope of SCAMS 2017 included methods and practices that combine various emerging internetworking and data technologies to capture, integrate, analyze, mine, annotate, and visualize data in a meaningful and collaborative manner. A series of international workshops were organized as invited sessions during the SCAMS 2017:The 2nd International Workshop on Smart Learning & Innovative EducationsThe 1st International Workshop on Smart HealthcareThe 1st International Workshop on Mathematics for Smart CityThe 1st International Workshop Industry 4.0 and Smart Manufacturing

Emerging Trends in Intelligent Systems & Network Security (Lecture Notes on Data Engineering and Communications Technologies #147)

by Mohamed Ben Ahmed Bernadetta Kwintiana Ane Boudhir Anouar Abdelhakim Didi Rosiyadi

This book covers selected research works presented at the fifth International Conference on Networking, Information Systems and Security (NISS 2022), organized by the Research Center for Data and Information Sciences at the National Research and Innovation Agency (BRIN), Republic of Indonesia, and Moroccan Mediterranean Association of Sciences and Sustainable Development, Morocco, during March 30–31, 2022, hosted in online mode in Bandung, Indonesia. Building on the successful history of the conference series in the recent four years, this book aims to present the paramount role of connecting researchers around the world to disseminate and share new ideas in intelligent information systems, cyber-security, and networking technologies. The 49 chapters presented in this book were carefully reviewed and selected from 115 submissions. They focus on delivering intelligent solutions through leveraging advanced information systems, networking, and security for competitive advantage and cost savings in modern industrial sectors as well as public, business, and education sectors. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.

Map Construction Algorithms

by Mahmuda Ahmed Sophia Karagiorgou Dieter Pfoser Carola Wenk

The book provides an overview of the state-of-the-art of map construction algorithms, which use tracking data in the form of trajectories to generate vector maps. The most common trajectory type is GPS-based trajectories. It introduces three emerging algorithmic categories, outlines their general algorithmic ideas, and discusses three representative algorithms in greater detail. To quantify map construction algorithms, the authors include specific datasets and evaluation measures. The datasets, source code of map construction algorithms and evaluation measures are publicly available on http://www. mapconstruction. org. The web site serves as a repository for map construction data and algorithms and researchers can contribute by uploading their own code and benchmark data. Map Construction Algorithms is an excellent resource for professionals working in computational geometry, spatial databases, and GIS. Advanced-level students studying computer science, geography and mathematics will also find this book a useful tool.

Blockchain and Deep Learning: Future Trends and Enabling Technologies (Studies in Big Data #105)

by Khaled R. Ahmed Henry Hexmoor

This book introduces to blockchain and deep learning and explores and illustrates the current and new trends that integrate them. The pace and speeds for connectivity are certain on the ascend. Blockchain and deep learning are twin technologies that are integral to integrity and relevance of network contents. Since they are data-driven technologies, rapidly growing interests exist to incorporate them in efficient and secure data sharing and analysis applications. Blockchain and deep learning are sentinel contemporary research technologies. This book provides a comprehensive reference for blockchain and deep learning by covering all important topics. It identifies the bedrock principles and forward projecting methodologies that illuminate the trajectory of developments for the decades ahead.

Deep Learning and Big Data for Intelligent Transportation: Enabling Technologies and Future Trends (Studies in Computational Intelligence #945)

by Khaled R. Ahmed Aboul Ella Hassanien

This book contributes to the progress towards intelligent transportation. It emphasizes new data management and machine learning approaches such as big data, deep learning and reinforcement learning. Deep learning and big data are very energetic and vital research topics of today’s technology. Road sensors, UAVs, GPS, CCTV and incident reports are sources of massive amount of data which are crucial to make serious traffic decisions. Herewith this substantial volume and velocity of data, it is challenging to build reliable prediction models based on machine learning methods and traditional relational database. Therefore, this book includes recent research works on big data, deep convolution networks and IoT-based smart solutions to limit the vehicle’s speed in a particular region, to support autonomous safe driving and to detect animals on roads for mitigating animal-vehicle accidents. This book serves broad readers including researchers, academicians, students and working professional in vehicles manufacturing, health and transportation departments and networking companies.

Media Practice in Iraq

by Ahmed K. Al-Rawi

A historical survey of the Iraqi media from its beginning up to the present day, focusing on the post-2003 media scene and the political and societal divisions that occurred in Iraq after US-led occupation. Investigates the nature of the media outlets and offers an analysis of the way Iraqi satellite channels covered the 2010 general elections.

Pipelined ADC Design and Enhancement Techniques

by Imran Ahmed

Pipelined ADCs have seen phenomenal improvements in performance over the last few years. As such, when designing a pipelined ADC a clear understanding of the design tradeoffs, and state of the art techniques is required to implement today's high performance low power ADCs.

PostgreSQL Developer's Guide

by Ibrar Ahmed Asif Fayyaz

If you are a database developer who wants to learn how to design and implement databases for application development using PostgreSQL, this is the book for you. Existing knowledge of basic database concepts and some programming experience is required

Implementing Citrix XenServer Quickstarter

by Gohar Ahmed

Implementing Citrix XenServer Quick Starter is a practical, hands-on guide that will help you get started with the Citrix XenServer Virtualization technology with easy-to-follow instructions.Implementing Citrix XenServer Quick Starter is for system administrators who have little to no information on virtualization and specifically Citrix XenServer Virtualization. If you're managing a lot of physical servers and are tired of installing, deploying, updating, and managing physical machines on a daily basis over and over again, then you should probably explore your option of XenServer Virtualization. This book will be your best friend to make you a better systems engineer.

Data Protection and Privacy in Healthcare: Research and Innovations

by Ahmed Elngar, Ambika Pawar, and Prathamesh Churi

The Healthcare industry is one of the largest and rapidly developing industries. Over the last few years, healthcare management is changing from disease centered to patient centered. While on one side the analysis of healthcare data plays an important role in healthcare management, but on the other side the privacy of a patient’s record must be of equal concern. This book uses a research-oriented approach and focuses on privacy-based healthcare tools and technologies. It offers details on privacy laws with real-life case studies and examples, and addresses privacy issues in newer technologies such as Cloud, Big Data, and IoT. It discusses the e-health system and preserving its privacy, and the use of wearable technologies for patient monitoring, data streaming and sharing, and use of data analysis to provide various health services. This book is written for research scholars, academicians working in healthcare and data privacy domains, as well as researchers involved with healthcare law, and those working at facilities in security and privacy domains. Students and industry professionals, as well as medical practitioners might also find this book of interest.

Coding for MIMO-OFDM in Future Wireless Systems (SpringerBriefs in Electrical and Computer Engineering)

by Bannour Ahmed Mohammad Abdul Matin

This book introduces the reader to the MIMO-OFDM system, in Rayleigh frequency selective-channels. Orthogonal frequency division multiplexing (OFDM) has been adopted in the wireless local-area network standards IEEE 802. 11a due to its high spectral efficiency and ability to deal with frequency selective fading. The combination of OFDM with spectral efficient multiple antenna techniques makes the OFDM a good candidate to overcome the frequency selective problems.

Foundations of Software Engineering

by Ashfaque Ahmed Bhanu Prasad

The best way to learn software engineering is by understanding its core and peripheral areas. Foundations of Software Engineering provides in-depth coverage of the areas of software engineering that are essential for becoming proficient in the field. The book devotes a complete chapter to each of the core areas. Several peripheral areas are also explained by assigning a separate chapter to each of them. Rather than using UML or other formal notations, the content in this book is explained in easy-to-understand language. Basic programming knowledge using an object-oriented language is helpful to understand the material in this book. The knowledge gained from this book can be readily used in other relevant courses or in real-world software development environments.This textbook educates students in software engineering principles. It covers almost all facets of software engineering, including requirement engineering, system specifications, system modeling, system architecture, system implementation, and system testing. Emphasizing practical issues, such as feasibility studies, this book explains how to add and develop software requirements to evolve software systems.This book was written after receiving feedback from several professors and software engineers. What resulted is a textbook on software engineering that not only covers the theory of software engineering but also presents real-world insights to aid students in proper implementation. Students learn key concepts through carefully explained and illustrated theories, as well as concrete examples and a complete case study using Java. Source code is also available on the book’s website. The examples and case studies increase in complexity as the book progresses to help students build a practical understanding of the required theories and applications.

The SAP Materials Management Handbook

by Ashfaque Ahmed

Although tens of thousands of global users have implemented Systems, Applications, and Products (SAP) for enterprise data processing for decades, there has been a need for a dependable reference on the subject, particularly for SAP materials management (SAP MM).Filling this need, The SAP Materials Management Handbook provides a complete understandi

Software Project Management: A Process-Driven Approach

by Ashfaque Ahmed

To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality, facilitate cost reductions, and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects, Software Project Management: A

Django Project Blueprints

by Asad Jibran Ahmed

Develop stunning web application projects with the Django framework About This Book * Build six exciting projects and use them as a blueprint for your own work * Extend Django's built-in models and forms to add common functionalities into your project, without reinventing the wheel * Gain insights into the inner workings of Django to better leverage it Who This Book Is For If you are a Django web developer able to build basic web applications with the framework, then this book is for you. This book will help you gain a deeper understanding of the Django web framework by guiding you through the development of six amazing web applications. What You Will Learn * Share code between a client-facing application and Django's admin * Combine client and server-side code for enhanced functionality * Geo-enable your models to provide common functionality based on geography * Add a REST API to your models to allow other applications to interact with your code * Future-proof your code with unit and functional tests * Add e-commerce capabilities to your site, build a shopping cart, and issue refunds * Process information asynchronously using Web Sockets to provide a real-time user interface In Detail Django is a high-level web framework that eases the creation of complex, database-driven websites. It emphasizes on the reusability and pluggability of components, rapid development, and the principle of don't repeat yourself. It lets you build high-performing, elegant web applications quickly. There are several Django tutorials available online, which take as many shortcuts as possible, but leave you wondering how you can adapt them to your own needs. This guide takes the opposite approach by demonstrating how to work around common problems and client requests, without skipping the important details. If you have built a few Django projects and are on the lookout for a guide to get you past the basics and get you solving modern development tasks, this is your book. Six unique projects will take you through the development process from scratch, leaving no stone unturned. In the first two projects, you will learn everything from adding ranking and voting capabilities to your App to building geospatial queries and APIs. In the third project, we will build an e-commerce platform, complete with a payment processor, basic cart, checkout features, and more! Next, we will get into caching data asynchronously and create a real-time app capable of consuming live updates. When you're done, you'll have consistent patterns and techniques that you can build on for many projects to come. Style and approach This easy-to-follow guide is full of examples that will take you through building six very different web applications with Django. The code is broken down into manageable bites and then thoroughly explained.

Exploring Silences in the Field of Computer Assisted Language Learning

by Anwar Ahmed

This book is an attempt to pay deliberate attention to some silences on issues of social, cultural, and political importance that have remained unattended in the field of Computer Assisted Language Learning (CALL). Using an analytical framework developed by the French philosopher and cultural theorist Michel de Certeau, the author demonstrates how silences can actively shape the boundaries of a scholarly field. He argues that a “geography of the forgotten” in the field of CALL undermines the transformative and social justice potential of language teaching by using digital technologies. The book will appeal to graduate students, teacher educators, and academic researchers who are looking for fresh perspectives and innovative ideas for integrating technologies into the curriculum and pedagogy of language education.

Machine Learning Applications in Medicine and Biology

by Ammar Ahmed Joseph Picone

This book combines selected papers from the 2022 IEEE Signal Processing in Medicine and Biology Symposium (IEEE SPMB) held at Temple University. The symposium presents multidisciplinary research in the life sciences. Topics covered include:Signal and image analysis (EEG, ECG, MRI)Machine learningData mining and classificationBig data resourcesApplications of particular interest at the 2022 symposium included digital pathology, computational biology, and quantum computing. The book features tutorials and examples of successful applications that will appeal to a wide range of professionals and researchers in signal processing, medicine, and biology.

Programming Languages and Systems: 27th European Symposium On Programming, Esop 2018, Held As Part Of The European Joint Conferences On Theory And Practice Of Software, Etaps 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings (Lecture Notes in Computer Science #10801)

by Amal Ahmed

This open access book constitutes the proceedings of the 27th European Symposium on Programming, ESOP 2018, which took place in Thessaloniki, Greece in April 2018, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018. The 36 papers presented in this volume were carefully reviewed and selected from 114 submissions. The papers are organized in topical sections named: language design; probabilistic programming; types and effects; concurrency; security; program verification; program analysis and automated verification; session types and concurrency; concurrency and distribution; and compiler verification.

Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems

by Alexis Ahmed

Enumerate and exploit Linux or Windows systems and escalate your privileges to the highest levelKey FeaturesDiscover a range of techniques to escalate privileges on Windows and Linux systemsUnderstand the key differences between Windows and Linux privilege escalationExplore unique exploitation challenges in each chapter provided in the form of pre-built VMsBook DescriptionPrivilege escalation is a crucial step in the exploitation life cycle of a penetration tester. It helps penetration testers to set up persistence and facilitates lateral movement. This book is one of a kind, covering a range of privilege escalation techniques and tools for both Windows and Linux systems. The book uses virtual environments that you can download to test and run tools and techniques. Each chapter will feature an exploitation challenge in the form of pre-built virtual machines (VMs). As you progress, you will learn how to enumerate and exploit a target Linux or Windows system. This privilege escalation book then demonstrates how you can escalate your privileges to the highest level. By the end of this book, you will have gained the skills you need to be able to perform local kernel exploits, escalate privileges through vulnerabilities in services, maintain persistence, and enumerate information from the target such as passwords and password hashes.What you will learnUnderstand the privilege escalation process and set up a pentesting labGain an initial foothold on the systemPerform local enumeration on target systemsExploit kernel vulnerabilities on Windows and Linux systemsPerform privilege escalation through password looting and finding stored credentialsGet to grips with performing impersonation attacksExploit Windows services such as the secondary logon handle service to escalate Windows privilegesEscalate Linux privileges by exploiting scheduled tasks and SUID binariesWho this book is forThis Windows and Linux privilege escalation book is for intermediate-level cybersecurity students and pentesters who are interested in learning how to perform various privilege escalation techniques on Windows and Linux systems, which includes exploiting bugs, design flaws, and more. An intermediate-level understanding of Windows and Linux systems along with fundamental cybersecurity knowledge is expected.

Velocity: The Seven New Laws for a World Gone Digital

by Ajaz Ahmed Stefan Olander

How can you win when the only certainty is change? Highly accessible, lively and inspiring, Velocity draws upon the authors’ unique perspectives and experiences to present seven timeless new laws for businesses and individuals in a world that is dominated by rapid change and digital technology. Written as a fascinating and enjoyable conversation between the authors – Stefan Olander, Vice President of Digital Sport from Nike and Ajaz Ahmed founder and Chairman AKQA – Velocity's up-to-date examples illustrate key lessons, together with insights, ideas and inspiration that individuals and businesses should adopt to thrive in the digital age. Velocity shares the vision and values required to succeed with the untold backstories to influential and iconic innovation. Fast paced, useful, provocative and highly motivating, Velocity is a management book that will arm you with actionable ideas to define your future. Features: - 4 Velocity principles: Speed, Direction, Acceleration, Discipline. - 7 Laws, including 'A Smith & Wesson beats four aces', 'It’s easier done than said', 'Convenient is the enemy of right' and 'No good joke survives a committee of six'.

Cybersecurity: A New Approach Using Chaotic Systems (Studies in Big Data #102)

by Ahmed A. Abd El-Latif Christos Volos

This book presents techniques and security challenges of chaotic systems and their use in cybersecurity. It presents the state-of-the-art and the latest discoveries in the field of chaotic systems and methods and proposes new models, practical solutions, and technological advances related to new chaotic dynamical systems. The book can be used as part of the bibliography of the following courses: - Cybersecurity - Cryptography - Networks and Communications Security - Nonlinear Circuits - Nonlinear Systems and Applications

Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities: Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) (EAI/Springer Innovations in Communication and Computing)

by Ahmed A. Abd El-Latif Lo’ai Tawalbeh Yassine Maleh Brij B. Gupta

This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing. The primary focus of the book addresses security mechanisms in IoT and edge/ fog computing, advanced secure deployments for large scaled edge/ fog computing, and new efficient data security strategy of IoT and edge/ fog computing. The book lays a foundation of the core concepts and principles of IoT and 5G security, walking the reader through the fundamental ideas. This book is aimed at researchers, graduate students, and engineers in the fields of secure IoT and edge/ fog computing. The book also presents selected papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022).

Refine Search

Showing 53,751 through 53,775 of 54,430 results