Browse Results

Showing 54,276 through 54,300 of 54,361 results

Everyday Data Visualization: Design effective charts and dashboards

by Desireé Abbott

Radically improve the quality of your data visualizations by employing core principles of color, typography, chart types, data storytelling, and more.Everyday Data Visualization is a field guide for design techniques that will improve the charts, reports, and data dashboards you build every day. Everything you learn is tool-agnostic, with universal principles you can apply to any data stack. In Everyday Data Visualization you&’ll learn important design principles for the most common data visualizations: Harness the power of perception to guide a user&’s attention Bring data to life with color and typography Choose the best chart types for your data story Design for interactive visualizations Keep the user&’s needs first throughout your projects This book gives you the tools you need to bring your data to life with clarity, precision, and flair. You&’ll learn how human brains perceive and process information, wield modern accessibility standards, get the basics of color theory and typography, and more. About the technology Even mundane presentations like charts, dashboards, and infographics can become engaging and inspiring data stories! This book shows you how to upgrade the visualizations you create every day by improving the layout, typography, color, and accessibility. You&’ll discover timeless principles of design that help you highlight important features, compensate for missing information, and interact with live data flows. About the book Everyday Data Visualization guides you through basic graphic design for the most common types of data visualization. You&’ll learn how to enhance charts with color, encourage users to interact and explore data and create visualizations accessible to everyone. Along the way, you&’ll practice each new skill as you take a dashboard project from research to publication. What's inside Bring data to life with color and typography Choose the best chart types for your data story Design interactive visualizations About the reader For readers experienced with data analysis tools. About the author Desireé Abbott has over a decade of experience in product analytics, business intelligence, science, design, and software engineering. The technical editor on this book was Michael Petrey. Table of Contents PART 1 1 Hello, data viz! 2 How we perceive information 3 It&’s all about the data PART 2 4 Choosing colors 5 Typography 6 Creating a good chart 7 Designing for interactivity PART 3 8 Research, design, and development 9 Troubleshooting Appendix

Applied Predictive Analytics

by Dean Abbott

Learn the art and science of predictive analytics -- techniques that get resultsPredictive analytics is what translates big data into meaningful, usable business information. Written by a leading expert in the field, this guide examines the science of the underlying algorithms as well as the principles and best practices that govern the art of predictive analytics. It clearly explains the theory behind predictive analytics, teaches the methods, principles, and techniques for conducting predictive analytics projects, and offers tips and tricks that are essential for successful predictive modeling. Hands-on examples and case studies are included.The ability to successfully apply predictive analytics enables businesses to effectively interpret big data; essential for competition todayThis guide teaches not only the principles of predictive analytics, but also how to apply them to achieve real, pragmatic solutionsExplains methods, principles, and techniques for conducting predictive analytics projects from start to finishIllustrates each technique with hands-on examples and includes as series of in-depth case studies that apply predictive analytics to common business scenariosA companion website provides all the data sets used to generate the examples as well as a free trial version of softwareApplied Predictive Analytics arms data and business analysts and business managers with the tools they need to interpret and capitalize on big data.

Special Educational Needs and the Internet: Issues for the Inclusive Classroom

by Chris Abbott

With Internet access for every school now a reality, teachers are beginning to explore the use of the Internet in the education of children with special needs. This book describes its benefits for children across the spectrum of special educational needs, from those with physical disabilities or sensory impairment to those with learning or social difficulties.With contributions from leading practitioners in the field, this book addresses the huge range of possibilities the Internet and associated technology offer for these pupils. Combining current theory and debate with practical guidance and inspiring case studies, this book considers:* how the Internet can be used to gather and publish information* how to communicate effectively through technology* policy and management issues for schools* the continuing challenges for access and inclusion.This book will be of interest to all teachers involved in special education needs, in both mainstream and special schools.

Text und Konzeption im Content Marketing: Alle wichtigen Grundlagen für Print, Web, Corporate Blogs und Social Media (essentials)

by Sandro Abbate

In diesem essential erfahren Sie alle wichtigen Grundlagen der Text- und Konzeptentwicklung f#65533;r eine Content-Marketing-Strategie. Der Autor beschreibt die erfolgsentscheidenden Stellschrauben, die Sie beachten m#65533;ssen und in die Sie ausreichend Zeit investieren sollten: von der vorab zu leistenden Denkarbeit, #65533;ber die strukturierte Konzeptentwicklung, bis hin zur optimalen Textarbeit f#65533;r Webtexte. Abgerundet wird dieser Band durch Interviews mit renommierten Experten und Erfolgsbeispielen aus der Praxis.

Inventing the Internet

by Janet Abbate

Since the late 1960s the Internet has grown from a single experimental network serving a dozen sites in the United States to a network of networks linking millions of computers worldwide. In Inventing the Internet, Janet Abbate recounts the key players and technologies that allowed the Internet to develop; but her main focus is always on the social and cultural factors that influenced the Internets design and use. The story she unfolds is an often twisting tale of collaboration and conflict among a remarkable variety of players, including government and military agencies, computer scientists in academia and industry, graduate students, telecommunications companies, standards organizations, and network users. The story starts with the early networking breakthroughs formulated in Cold War think tanks and realized in the Defense Department's creation of the ARPANET. It ends with the emergence of the Internet and its rapid and seemingly chaotic growth. Abbate looks at how academic and military influences and attitudes shaped both networks; how the usual lines between producer and user of a technology were crossed with interesting and unique results; and how later users invented their own very successful applications, such as electronic mail and the World Wide Web. She concludes that such applications continue the trend of decentralized, user-driven development that has characterized the Internet's entire history and that the key to the Internet's success has been a commitment to flexibility and diversity, both in technical design and in organizational culture.

Recoding Gender: Women's Changing Participation in Computing (History of Computing)

by Janet Abbate

The untold history of women and computing: how pioneering women succeeded in a field shaped by gender biases.Today, women earn a relatively low percentage of computer science degrees and hold proportionately few technical computing jobs. Meanwhile, the stereotype of the male “computer geek” seems to be everywhere in popular culture. Few people know that women were a significant presence in the early decades of computing in both the United States and Britain. Indeed, programming in postwar years was considered woman's work (perhaps in contrast to the more manly task of building the computers themselves). In Recoding Gender, Janet Abbate explores the untold history of women in computer science and programming from the Second World War to the late twentieth century. Demonstrating how gender has shaped the culture of computing, she offers a valuable historical perspective on today's concerns over women's underrepresentation in the field.Abbate describes the experiences of women who worked with the earliest electronic digital computers: Colossus, the wartime codebreaking computer at Bletchley Park outside London, and the American ENIAC, developed to calculate ballistics. She examines postwar methods for recruiting programmers, and the 1960s redefinition of programming as the more masculine “software engineering.” She describes the social and business innovations of two early software entrepreneurs, Elsie Shutt and Stephanie Shirley; and she examines the career paths of women in academic computer science.Abbate's account of the bold and creative strategies of women who loved computing work, excelled at it, and forged successful careers will provide inspiration for those working to change gendered computing culture.

Recoding Gender

by Janet Abbate

Today, women earn a relatively low percentage of computer science degrees and hold proportionately few technical computing jobs. Meanwhile, the stereotype of the male "computer geek" seems to be everywhere in popular culture. Few people know that women were a significant presence in the early decades of computing in both the United States and Britain. Indeed, programming in postwar years was considered woman's work (perhaps in contrast to the more manly task of building the computers themselves). In Recoding Gender, Janet Abbate explores the untold history of women in computer science and programming from the Second World War to the late twentieth century. Demonstrating how gender has shaped the culture of computing, she offers a valuable historical perspective on today's concerns over women's underrepresentation in the field. Abbate describes the experiences of women who worked with the earliest electronic digital computers: Colossus, the wartime codebreaking computer at Bletchley Park outside London, and the American ENIAC, developed to calculate ballistics. She examines postwar methods for recruiting programmers, and the 1960s redefinition of programming as the more masculine "software engineering." She describes the social and business innovations of two early software entrepreneurs, Elsie Shutt and Stephanie Shirley; and she examines the career paths of women in academic computer science. Abbate's account of the bold and creative strategies of women who loved computing work, excelled at it, and forged successful careers will provide inspiration for those working to change gendered computing culture.

Security and Resilience in Cyber-Physical Systems: Detection, Estimation and Control

by Masoud Abbaszadeh Ali Zemouche

This book discusses the latest advances in cyber-physical security and resilience of cyber-physical systems, including cyber-attack detection, isolation, situation awareness, resilient estimation and resilient control under attack. It presents both theoretical results and important applications of the methods. Security and Resilience in Cyber-Physical Systems begins by introducing the topic of cyber-physical security, covering state-of-the-art trends in both theory and applications, as well as some of the emerging methodologies and future directions for research. It then moves on to detail theoretical methods of attack detection, resilient estimation and control within cyber-physical systems, before discussing their various applications, such as power generation and distribution, autonomous systems, wireless communication networks and chemical plants. Focusing on the detection of and accommodation to cyber-attacks on cyber-physical systems, and including both estimation and artificial-intelligence-based methods, this book will be of interest to researchers, engineers and graduate students within the fields of cyber-physical security and resilient control.

Simulation and Computational Red Teaming for Problem Solving (IEEE Press Series on Computational Intelligence)

by Hussein Abbass Jiangjun Tang George Leu

An authoritative guide to computer simulation grounded in a multi-disciplinary approach for solving complex problems Simulation and Computational Red Teaming for Problem Solving offers a review of computer simulation that is grounded in a multi-disciplinary approach. The authors present the theoretical foundations of simulation and modeling paradigms from the perspective of an analyst. The book provides the fundamental background information needed for designing and developing consistent and useful simulations. In addition to this basic information, the authors explore several advanced topics. The book’s advanced topics demonstrate how modern artificial intelligence and computational intelligence concepts and techniques can be combined with various simulation paradigms for solving complex and critical problems. Authors examine the concept of Computational Red Teaming to reveal how the combined fundamentals and advanced techniques are used successfully for solving and testing complex real-world problems. This important book: • Demonstrates how computer simulation and Computational Red Teaming support each other for solving complex problems • Describes the main approaches to modeling real-world phenomena and embedding these models into computer simulations • Explores how a number of advanced artificial intelligence and computational intelligence concepts are used in conjunction with the fundamental aspects of simulation Written for researchers and students in the computational modelling and data analysis fields, Simulation and Computational Red Teaming for Problem Solving covers the foundation and the standard elements of the process of building a simulation and explores the simulation topic with a modern research approach.

Recent Advances in Computational Intelligence in Defense and Security

by Hussein A. Abbass Nur Zincir-Heywood Rafael Falcon Rami Abielmona

This volume is an initiative undertaken by the IEEE ComputationalIntelligence Society's Task Force on Security, Surveillance and Defense to consolidateand disseminate the role of CI techniques in the design, development anddeployment of security and defense solutions. Applications range from thedetection of buried explosive hazards in a battlefield to the control ofunmanned underwater vehicles, the delivery of superior video analytics forprotecting critical infrastructures or the development of stronger intrusiondetection systems and the design of military surveillance networks. Defensescientists, industry experts, academicians and practitioners alike will allbenefit from the wide spectrum of successful applications compiled in thisvolume. Senior undergraduate or graduate students may also discover unchartedterritory for their own research endeavors.

Shepherding UxVs for Human-Swarm Teaming: An Artificial Intelligence Approach to Unmanned X Vehicles (Unmanned System Technologies)

by Hussein A. Abbass Robert A. Hunjet

This book draws inspiration from natural shepherding, whereby a farmer utilizes sheepdogs to herd sheep, to inspire a scalable and inherently human friendly approach to swarm control. The book discusses advanced artificial intelligence (AI) approaches needed to design smart robotic shepherding agents capable of controlling biological swarms or robotic swarms of unmanned vehicles. These smart shepherding agents are described with the techniques applicable to the control of Unmanned X Vehicles (UxVs) including air (unmanned aerial vehicles or UAVs), ground (unmanned ground vehicles or UGVs), underwater (unmanned underwater vehicles or UUVs), and on the surface of water (unmanned surface vehicles or USVs). This book proposes how smart ‘shepherds’ could be designed and used to guide a swarm of UxVs to achieve a goal while ameliorating typical communication bandwidth issues that arise in the control of multi agent systems. The book covers a wide range of topics ranging from the design of deep reinforcement learning models for shepherding a swarm, transparency in swarm guidance, and ontology-guided learning, to the design of smart swarm guidance methods for shepherding with UGVs and UAVs. The book extends the discussion to human-swarm teaming by looking into the real-time analysis of human data during human-swarm interaction, the concept of trust for human-swarm teaming, and the design of activity recognition systems for shepherding.Presents a comprehensive look at human-swarm teaming;Tackles artificial intelligence techniques for swarm guidance;Provides artificial intelligence techniques for real-time human performance analysis.

Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

by Hussein A. Abbass

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT). The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shadows the operations of an actual system to think with decision makers, challenge threats, and design remedies. This is the first book to generalize red teaming (RT) outside the military and security domains and it offers coverage of RT principles, practical and ethical guidelines. The author utilizes Gilbert's principles for introducing a science. Simplicity: where the book follows a special style to make it accessible to a wide range of readers. Coherence: where only necessary elements from experimentation, optimization, simulation, data mining, big data, cognitive information processing, and system thinking are blended together systematically to present CRT as the science of Risk Analytics and Challenge Analytics. Utility: where the author draws on a wide range of examples, ranging from job interviews to Cyber operations, before presenting three case studies from air traffic control technologies, human behavior, and complex socio-technical systems involving real-time mining and integration of human brain data in the decision making environment.

Learning Apache Spark 2

by Muhammad Asif Abbasi

Learn about the fastest-growing open source project in the world, and find out how it revolutionizes big data analytics About This Book • Exclusive guide that covers how to get up and running with fast data processing using Apache Spark • Explore and exploit various possibilities with Apache Spark using real-world use cases in this book • Want to perform efficient data processing at real time? This book will be your one-stop solution. Who This Book Is For This guide appeals to big data engineers, analysts, architects, software engineers, even technical managers who need to perform efficient data processing on Hadoop at real time. Basic familiarity with Java or Scala will be helpful. The assumption is that readers will be from a mixed background, but would be typically people with background in engineering/data science with no prior Spark experience and want to understand how Spark can help them on their analytics journey. What You Will Learn • Get an overview of big data analytics and its importance for organizations and data professionals • Delve into Spark to see how it is different from existing processing platforms • Understand the intricacies of various file formats, and how to process them with Apache Spark. • Realize how to deploy Spark with YARN, MESOS or a Stand-alone cluster manager. • Learn the concepts of Spark SQL, SchemaRDD, Caching and working with Hive and Parquet file formats • Understand the architecture of Spark MLLib while discussing some of the off-the-shelf algorithms that come with Spark. • Introduce yourself to the deployment and usage of SparkR. • Walk through the importance of Graph computation and the graph processing systems available in the market • Check the real world example of Spark by building a recommendation engine with Spark using ALS. • Use a Telco data set, to predict customer churn using Random Forests. In Detail Spark juggernaut keeps on rolling and getting more and more momentum each day. Spark provides key capabilities in the form of Spark SQL, Spark Streaming, Spark ML and Graph X all accessible via Java, Scala, Python and R. Deploying the key capabilities is crucial whether it is on a Standalone framework or as a part of existing Hadoop installation and configuring with Yarn and Mesos. The next part of the journey after installation is using key components, APIs, Clustering, machine learning APIs, data pipelines, parallel programming. It is important to understand why each framework component is key, how widely it is being used, its stability and pertinent use cases. Once we understand the individual components, we will take a couple of real life advanced analytics examples such as 'Building a Recommendation system', 'Predicting customer churn' and so on. The objective of these real life examples is to give the reader confidence of using Spark for real-world problems. Style and approach With the help of practical examples and real-world use cases, this guide will take you from scratch to building efficient data applications using Apache Spark. You will learn all about this excellent data processing engine in a step-by-step manner, taking one aspect of it at a time. This highly practical guide will include how to work with data pipelines, dataframes, clustering, SparkSQL, parallel programming, and such insightful topics with the help of real-world use cases.

AWS Certified Data Analytics Study Guide: Specialty (DAS-C01) Exam

by Asif Abbasi

Move your career forward with AWS certification! Prepare for the AWS Certified Data Analytics Specialty Exam with this thorough study guide This comprehensive study guide will help assess your technical skills and prepare for the updated AWS Certified Data Analytics exam. Earning this AWS certification will confirm your expertise in designing and implementing AWS services to derive value from data. The AWS Certified Data Analytics Study Guide: Specialty (DAS-C01) Exam is designed for business analysts and IT professionals who perform complex Big Data analyses. This AWS Specialty Exam guide gets you ready for certification testing with expert content, real-world knowledge, key exam concepts, and topic reviews. Gain confidence by studying the subject areas and working through the practice questions. Big data concepts covered in the guide include: Collection Storage Processing Analysis Visualization Data security AWS certifications allow professionals to demonstrate skills related to leading Amazon Web Services technology. The AWS Certified Data Analytics Specialty (DAS-C01) Exam specifically evaluates your ability to design and maintain Big Data, leverage tools to automate data analysis, and implement AWS Big Data services according to architectural best practices. An exam study guide can help you feel more prepared about taking an AWS certification test and advancing your professional career. In addition to the guide’s content, you’ll have access to an online learning environment and test bank that offers practice exams, a glossary, and electronic flashcards.

Guessing Random Additive Noise Decoding: A Hardware Perspective

by Syed Mohsin Abbas Marwan Jalaleddine Warren J. Gross

This book gives a detailed overview of a universal Maximum Likelihood (ML) decoding technique, known as Guessing Random Additive Noise Decoding (GRAND), has been introduced for short-length and high-rate linear block codes. The interest in short channel codes and the corresponding ML decoding algorithms has recently been reignited in both industry and academia due to emergence of applications with strict reliability and ultra-low latency requirements . A few of these applications include Machine-to-Machine (M2M) communication, augmented and virtual Reality, Intelligent Transportation Systems (ITS), the Internet of Things (IoTs), and Ultra-Reliable and Low Latency Communications (URLLC), which is an important use case for the 5G-NR standard. GRAND features both soft-input and hard-input variants. Moreover, there are traditional GRAND variants that can be used with any communication channel, and specialized GRAND variants that are developed for a specific communication channel. This book presents a detailed overview of these GRAND variants and their hardware architectures. The book is structured into four parts. Part 1 introduces linear block codes and the GRAND algorithm. Part 2 discusses the hardware architecture for traditional GRAND variants that can be applied to any underlying communication channel. Part 3 describes the hardware architectures for specialized GRAND variants developed for specific communication channels. Lastly, Part 4 provides an overview of recently proposed GRAND variants and their unique applications.This book is ideal for researchers or engineers looking to implement high-throughput and energy-efficient hardware for GRAND, as well as seasoned academics and graduate students interested in the topic of VLSI hardware architectures. Additionally, it can serve as reading material in graduate courses covering modern error correcting codes and Maximum Likelihood decoding for short codes.

From Terrorism to Television: Dynamics of Media, State, and Society in Pakistan

by Qaisar Abbas

This book unpacks the media dynamics within the socio-cultural, political, and economic context of Pakistan. It provides an in-depth, critical, and scholarly discussion of contemporary issues such as media, state, and democracy in Pakistan; freedom of expression in Pakistani journalism; Balochistan as a blind spot in mainstream newspapers; media control by state institutions; women and media discourses; TV talk shows and coverage of Kashmir; feminist narrative and media images of Malala Yousufzai and Mukhtaran Mai; jihad on screen; and Osama bin Laden’s death on screen, to understand the relation between media and terrorism. The book covers diverse media types including TV, radio, newspapers, print media, films, documentary, stage performance, and social media. Detailed, interdisciplinary, analytical, and with original perspectives from journalists as well as academics, this volume will be useful to scholars and researchers of media studies, Pakistan studies, politics and international affairs, military and terrorism studies, journalism and communication studies, and South Asian studies. It will also interest general readers, policy makers, and those interested in global journalism, mass media, and freedom of expression.

Analysis and Application of Natural Language and Speech Processing (Signals and Communication Technology)

by Mourad Abbas

This book presents recent advances in NLP and speech technology, a topic attracting increasing interest in a variety of fields through its myriad applications, such as the demand for speech guided touchless technology during the Covid-19 pandemic. The authors present results of recent experimental research that provides contributions and solutions to different issues related to speech technology and speech in industry. Technologies include natural language processing, automatic speech recognition (for under-resourced dialects) and speech synthesis that are useful for applications such as intelligent virtual assistants, among others. Applications cover areas such as sentiment analysis and opinion mining, Arabic named entity recognition, and language modelling. This book is relevant for anyone interested in the latest in language and speech technology.

Practical Solutions for Diverse Real-World NLP Applications (Signals and Communication Technology)

by Mourad Abbas

This book unveils the most advanced techniques and innovative applications in the natural language processing (NLP) field. It uncovers the secrets to enhancing language understanding, and presents practical solutions to different NLP tasks, as text augmentation, paraphrase generation, and restoring spaces and punctuation in multiple languages. It unlocks the potential of hierarchical multi-task learning for cross-lingual phoneme recognition, and allows readers to explore more real-world applications such as error correction, aggregating industrial security findings as well as predicting music emotion values from social media conversations. "Practical Solutions for Diverse Real-World NLP Applications" is the suitable guidebook for researchers, students, and practitioners as it paves the way for them by delivering invaluable insights and knowledge.

New Trends in Information and Communications Technology Applications: 4th International Conference, NTICT 2020, Baghdad, Iraq, June 15, 2020, Proceedings (Communications in Computer and Information Science #1183)

by Abbas M. Al-Bakry Safaa O. Al-Mamory Mouayad A. Sahib Haitham S. Hasan George S. Oreku Thaker M. Nayl Jaafar A. Al-Dhaibani

This book constitutes refereed proceedings of the 4th International Conference on New Trends in Information and Communications Technology Applications, NTICT 2020, held on June 15, 2020. The NTICT conference was planned to take place in Baghdad on March 11-12, 2019, but due to the COVID-19 pandemic the conference has been postponed on June 15, 2020 and moved to the virtual format.The 15 full papers and 3 short papers presented were thoroughly reviewed and selected from 90 qualified submissions. The volume presents the latest research results in such areas as network protocols, overlay and other logical network structures, wireless access networks, computer vision, machine learning, artificial Intelligence, data mining, control methods.

New Trends in Information and Communications Technology Applications: 7th National Conference, NTICT 2023, Baghdad, Iraq, December 20–21, 2023, Proceedings (Communications in Computer and Information Science #2096)

by Abbas M. Al-Bakry Safaa O. Al-Mamory Mouayad A. Sahib Haitham S. Hasan Jaafar A. Aldhaibani Ali N. Al-Shuwaili Rula A. Hamid Ali K. Idrees

This book constitutes the refereed proceedings of the 7th National Conference on New Trends in Information and Communications Technology Applications, NTICT 2023, held in Baghdad, Iraq, during December 20–21, 2023. The 28 full papers included in this book were carefully reviewed and selected from 92 submissions. They were organized in topical sections as follows: artificial intelligence and machine learning; and computer networks.

New Trends in Information and Communications Technology Applications: 6th International Conference, NTICT 2022, Baghdad, Iraq, November 16–17, 2022, Proceedings (Communications in Computer and Information Science #1764)

by Abbas M. Al-Bakry Safaa O. Al-Mamory Mouayad A. Sahib Loay E. George Jaafar A. Aldhaibani Haitham S. Hasan George S. Oreku

This book constitutes the refereed proceedings of the 6th International Conference on New Trends in Information and Communications Technology Applications, NTICT 2022, held in Baghdad, Iraq, during November 16–17, 2022. The 14 full papers included in this book were carefully reviewed and selected from 53 submissions. They were organized in topical sections as follows: computing methodologies; information systems; network; security and privacy.

Handbook of Digital CMOS Technology, Circuits, and Systems

by Karim Abbas

This book provides a comprehensive reference for everything that has to do with digital circuits. The author focuses equally on all levels of abstraction. He tells a bottom-up story from the physics level to the finished product level. The aim is to provide a full account of the experience of designing, fabricating, understanding, and testing a microchip. The content is structured to be very accessible and self-contained, allowing readers with diverse backgrounds to read as much or as little of the book as needed. Beyond a basic foundation of mathematics and physics, the book makes no assumptions about prior knowledge. This allows someone new to the field to read the book from the beginning. It also means that someone using the book as a reference will be able to answer their questions without referring to any external sources.

Next-Generation Ethics: Engineering a Better Society

by Ali E. Abbas

Many of the significant developments of our era have resulted from advances in technology, including the design of large-scale systems; advances in medicine, manufacturing, and artificial intelligence; the role of social media in influencing behaviour and toppling governments; and the surge of online transactions that are replacing human face-to-face interactions. These advances have given rise to new kinds of ethical concerns around the uses (and misuses) of technology. This collection of essays by prominent academics and technology leaders covers important ethical questions arising in modern industry, offering guidance on how to approach these dilemmas. Chapters discuss what we can learn from the ethical lapses of #MeToo, Volkswagen, and Cambridge Analytica, and highlight the common need across all applications for sound decision-making and understanding the implications for stakeholders. Technologists and general readers with no formal ethics training and specialists exploring technological applications to the field of ethics will benefit from this overview.

Database Systems for Advanced Applications. DASFAA 2023 International Workshops: BDMS 2023, BDQM 2023, GDMA 2023, BundleRS 2023, Tianjin, China, April 17-20, 2023, Proceedings (Lecture Notes in Computer Science #13922)

by Amr El Abbadi Gillian Dobbie Zhiyong Feng Lu Chen Xiaohui Tao Yingxia Shao Hongzhi Yin

This volume constitutes the papers of several workshops which were held in conjunction with the 28th International Conference on Database Systems for Advanced Applications, DASFAA 2023, held in Tanjin, China, in April 2023. The 23 revised full papers presented in this book were carefully reviewed and selected from 40 submissions. DASFAA 2023 presents the following four workshops: 9th International Workshop on Big Data Management and Service (BDMS 2023), 8th International Workshop on Big Data Quality Management (BDQM 2023); 7th International Workshop on Graph Data Management and Analysis (GDMA 2023); 1st International Workshop on Bundle-based Recommendation Systems (BundleRS 2023).

Windows 10: Learn Tips And Tricks On Using Windows 10 Operating System

by Blerton Abazi

Windows 10 Learn tips and trick on using Windows 10 operating system

Refine Search

Showing 54,276 through 54,300 of 54,361 results