Browse Results

Showing 54,401 through 54,425 of 54,475 results

Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

by Hussein A. Abbass

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT). The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shadows the operations of an actual system to think with decision makers, challenge threats, and design remedies. This is the first book to generalize red teaming (RT) outside the military and security domains and it offers coverage of RT principles, practical and ethical guidelines. The author utilizes Gilbert's principles for introducing a science. Simplicity: where the book follows a special style to make it accessible to a wide range of readers. Coherence: where only necessary elements from experimentation, optimization, simulation, data mining, big data, cognitive information processing, and system thinking are blended together systematically to present CRT as the science of Risk Analytics and Challenge Analytics. Utility: where the author draws on a wide range of examples, ranging from job interviews to Cyber operations, before presenting three case studies from air traffic control technologies, human behavior, and complex socio-technical systems involving real-time mining and integration of human brain data in the decision making environment.

Learning Apache Spark 2

by Muhammad Asif Abbasi

Learn about the fastest-growing open source project in the world, and find out how it revolutionizes big data analytics About This Book • Exclusive guide that covers how to get up and running with fast data processing using Apache Spark • Explore and exploit various possibilities with Apache Spark using real-world use cases in this book • Want to perform efficient data processing at real time? This book will be your one-stop solution. Who This Book Is For This guide appeals to big data engineers, analysts, architects, software engineers, even technical managers who need to perform efficient data processing on Hadoop at real time. Basic familiarity with Java or Scala will be helpful. The assumption is that readers will be from a mixed background, but would be typically people with background in engineering/data science with no prior Spark experience and want to understand how Spark can help them on their analytics journey. What You Will Learn • Get an overview of big data analytics and its importance for organizations and data professionals • Delve into Spark to see how it is different from existing processing platforms • Understand the intricacies of various file formats, and how to process them with Apache Spark. • Realize how to deploy Spark with YARN, MESOS or a Stand-alone cluster manager. • Learn the concepts of Spark SQL, SchemaRDD, Caching and working with Hive and Parquet file formats • Understand the architecture of Spark MLLib while discussing some of the off-the-shelf algorithms that come with Spark. • Introduce yourself to the deployment and usage of SparkR. • Walk through the importance of Graph computation and the graph processing systems available in the market • Check the real world example of Spark by building a recommendation engine with Spark using ALS. • Use a Telco data set, to predict customer churn using Random Forests. In Detail Spark juggernaut keeps on rolling and getting more and more momentum each day. Spark provides key capabilities in the form of Spark SQL, Spark Streaming, Spark ML and Graph X all accessible via Java, Scala, Python and R. Deploying the key capabilities is crucial whether it is on a Standalone framework or as a part of existing Hadoop installation and configuring with Yarn and Mesos. The next part of the journey after installation is using key components, APIs, Clustering, machine learning APIs, data pipelines, parallel programming. It is important to understand why each framework component is key, how widely it is being used, its stability and pertinent use cases. Once we understand the individual components, we will take a couple of real life advanced analytics examples such as 'Building a Recommendation system', 'Predicting customer churn' and so on. The objective of these real life examples is to give the reader confidence of using Spark for real-world problems. Style and approach With the help of practical examples and real-world use cases, this guide will take you from scratch to building efficient data applications using Apache Spark. You will learn all about this excellent data processing engine in a step-by-step manner, taking one aspect of it at a time. This highly practical guide will include how to work with data pipelines, dataframes, clustering, SparkSQL, parallel programming, and such insightful topics with the help of real-world use cases.

AWS Certified Data Analytics Study Guide: Specialty (DAS-C01) Exam

by Asif Abbasi

Move your career forward with AWS certification! Prepare for the AWS Certified Data Analytics Specialty Exam with this thorough study guide This comprehensive study guide will help assess your technical skills and prepare for the updated AWS Certified Data Analytics exam. Earning this AWS certification will confirm your expertise in designing and implementing AWS services to derive value from data. The AWS Certified Data Analytics Study Guide: Specialty (DAS-C01) Exam is designed for business analysts and IT professionals who perform complex Big Data analyses. This AWS Specialty Exam guide gets you ready for certification testing with expert content, real-world knowledge, key exam concepts, and topic reviews. Gain confidence by studying the subject areas and working through the practice questions. Big data concepts covered in the guide include: Collection Storage Processing Analysis Visualization Data security AWS certifications allow professionals to demonstrate skills related to leading Amazon Web Services technology. The AWS Certified Data Analytics Specialty (DAS-C01) Exam specifically evaluates your ability to design and maintain Big Data, leverage tools to automate data analysis, and implement AWS Big Data services according to architectural best practices. An exam study guide can help you feel more prepared about taking an AWS certification test and advancing your professional career. In addition to the guide’s content, you’ll have access to an online learning environment and test bank that offers practice exams, a glossary, and electronic flashcards.

Guessing Random Additive Noise Decoding: A Hardware Perspective

by Syed Mohsin Abbas Marwan Jalaleddine Warren J. Gross

This book gives a detailed overview of a universal Maximum Likelihood (ML) decoding technique, known as Guessing Random Additive Noise Decoding (GRAND), has been introduced for short-length and high-rate linear block codes. The interest in short channel codes and the corresponding ML decoding algorithms has recently been reignited in both industry and academia due to emergence of applications with strict reliability and ultra-low latency requirements . A few of these applications include Machine-to-Machine (M2M) communication, augmented and virtual Reality, Intelligent Transportation Systems (ITS), the Internet of Things (IoTs), and Ultra-Reliable and Low Latency Communications (URLLC), which is an important use case for the 5G-NR standard. GRAND features both soft-input and hard-input variants. Moreover, there are traditional GRAND variants that can be used with any communication channel, and specialized GRAND variants that are developed for a specific communication channel. This book presents a detailed overview of these GRAND variants and their hardware architectures. The book is structured into four parts. Part 1 introduces linear block codes and the GRAND algorithm. Part 2 discusses the hardware architecture for traditional GRAND variants that can be applied to any underlying communication channel. Part 3 describes the hardware architectures for specialized GRAND variants developed for specific communication channels. Lastly, Part 4 provides an overview of recently proposed GRAND variants and their unique applications.This book is ideal for researchers or engineers looking to implement high-throughput and energy-efficient hardware for GRAND, as well as seasoned academics and graduate students interested in the topic of VLSI hardware architectures. Additionally, it can serve as reading material in graduate courses covering modern error correcting codes and Maximum Likelihood decoding for short codes.

From Terrorism to Television: Dynamics of Media, State, and Society in Pakistan

by Qaisar Abbas

This book unpacks the media dynamics within the socio-cultural, political, and economic context of Pakistan. It provides an in-depth, critical, and scholarly discussion of contemporary issues such as media, state, and democracy in Pakistan; freedom of expression in Pakistani journalism; Balochistan as a blind spot in mainstream newspapers; media control by state institutions; women and media discourses; TV talk shows and coverage of Kashmir; feminist narrative and media images of Malala Yousufzai and Mukhtaran Mai; jihad on screen; and Osama bin Laden’s death on screen, to understand the relation between media and terrorism. The book covers diverse media types including TV, radio, newspapers, print media, films, documentary, stage performance, and social media. Detailed, interdisciplinary, analytical, and with original perspectives from journalists as well as academics, this volume will be useful to scholars and researchers of media studies, Pakistan studies, politics and international affairs, military and terrorism studies, journalism and communication studies, and South Asian studies. It will also interest general readers, policy makers, and those interested in global journalism, mass media, and freedom of expression.

Analysis and Application of Natural Language and Speech Processing (Signals and Communication Technology)

by Mourad Abbas

This book presents recent advances in NLP and speech technology, a topic attracting increasing interest in a variety of fields through its myriad applications, such as the demand for speech guided touchless technology during the Covid-19 pandemic. The authors present results of recent experimental research that provides contributions and solutions to different issues related to speech technology and speech in industry. Technologies include natural language processing, automatic speech recognition (for under-resourced dialects) and speech synthesis that are useful for applications such as intelligent virtual assistants, among others. Applications cover areas such as sentiment analysis and opinion mining, Arabic named entity recognition, and language modelling. This book is relevant for anyone interested in the latest in language and speech technology.

Practical Solutions for Diverse Real-World NLP Applications (Signals and Communication Technology)

by Mourad Abbas

This book unveils the most advanced techniques and innovative applications in the natural language processing (NLP) field. It uncovers the secrets to enhancing language understanding, and presents practical solutions to different NLP tasks, as text augmentation, paraphrase generation, and restoring spaces and punctuation in multiple languages. It unlocks the potential of hierarchical multi-task learning for cross-lingual phoneme recognition, and allows readers to explore more real-world applications such as error correction, aggregating industrial security findings as well as predicting music emotion values from social media conversations. "Practical Solutions for Diverse Real-World NLP Applications" is the suitable guidebook for researchers, students, and practitioners as it paves the way for them by delivering invaluable insights and knowledge.

New Trends in Information and Communications Technology Applications: 4th International Conference, NTICT 2020, Baghdad, Iraq, June 15, 2020, Proceedings (Communications in Computer and Information Science #1183)

by Abbas M. Al-Bakry Safaa O. Al-Mamory Mouayad A. Sahib Haitham S. Hasan George S. Oreku Thaker M. Nayl Jaafar A. Al-Dhaibani

This book constitutes refereed proceedings of the 4th International Conference on New Trends in Information and Communications Technology Applications, NTICT 2020, held on June 15, 2020. The NTICT conference was planned to take place in Baghdad on March 11-12, 2019, but due to the COVID-19 pandemic the conference has been postponed on June 15, 2020 and moved to the virtual format.The 15 full papers and 3 short papers presented were thoroughly reviewed and selected from 90 qualified submissions. The volume presents the latest research results in such areas as network protocols, overlay and other logical network structures, wireless access networks, computer vision, machine learning, artificial Intelligence, data mining, control methods.

New Trends in Information and Communications Technology Applications: 7th National Conference, NTICT 2023, Baghdad, Iraq, December 20–21, 2023, Proceedings (Communications in Computer and Information Science #2096)

by Abbas M. Al-Bakry Safaa O. Al-Mamory Mouayad A. Sahib Haitham S. Hasan Jaafar A. Aldhaibani Ali N. Al-Shuwaili Rula A. Hamid Ali K. Idrees

This book constitutes the refereed proceedings of the 7th National Conference on New Trends in Information and Communications Technology Applications, NTICT 2023, held in Baghdad, Iraq, during December 20–21, 2023. The 28 full papers included in this book were carefully reviewed and selected from 92 submissions. They were organized in topical sections as follows: artificial intelligence and machine learning; and computer networks.

New Trends in Information and Communications Technology Applications: 6th International Conference, NTICT 2022, Baghdad, Iraq, November 16–17, 2022, Proceedings (Communications in Computer and Information Science #1764)

by Abbas M. Al-Bakry Safaa O. Al-Mamory Mouayad A. Sahib Loay E. George Jaafar A. Aldhaibani Haitham S. Hasan George S. Oreku

This book constitutes the refereed proceedings of the 6th International Conference on New Trends in Information and Communications Technology Applications, NTICT 2022, held in Baghdad, Iraq, during November 16–17, 2022. The 14 full papers included in this book were carefully reviewed and selected from 53 submissions. They were organized in topical sections as follows: computing methodologies; information systems; network; security and privacy.

Handbook of Digital CMOS Technology, Circuits, and Systems

by Karim Abbas

This book provides a comprehensive reference for everything that has to do with digital circuits. The author focuses equally on all levels of abstraction. He tells a bottom-up story from the physics level to the finished product level. The aim is to provide a full account of the experience of designing, fabricating, understanding, and testing a microchip. The content is structured to be very accessible and self-contained, allowing readers with diverse backgrounds to read as much or as little of the book as needed. Beyond a basic foundation of mathematics and physics, the book makes no assumptions about prior knowledge. This allows someone new to the field to read the book from the beginning. It also means that someone using the book as a reference will be able to answer their questions without referring to any external sources.

Next-Generation Ethics: Engineering a Better Society

by Ali E. Abbas

Many of the significant developments of our era have resulted from advances in technology, including the design of large-scale systems; advances in medicine, manufacturing, and artificial intelligence; the role of social media in influencing behaviour and toppling governments; and the surge of online transactions that are replacing human face-to-face interactions. These advances have given rise to new kinds of ethical concerns around the uses (and misuses) of technology. This collection of essays by prominent academics and technology leaders covers important ethical questions arising in modern industry, offering guidance on how to approach these dilemmas. Chapters discuss what we can learn from the ethical lapses of #MeToo, Volkswagen, and Cambridge Analytica, and highlight the common need across all applications for sound decision-making and understanding the implications for stakeholders. Technologists and general readers with no formal ethics training and specialists exploring technological applications to the field of ethics will benefit from this overview.

Database Systems for Advanced Applications. DASFAA 2023 International Workshops: BDMS 2023, BDQM 2023, GDMA 2023, BundleRS 2023, Tianjin, China, April 17-20, 2023, Proceedings (Lecture Notes in Computer Science #13922)

by Amr El Abbadi Gillian Dobbie Zhiyong Feng Lu Chen Xiaohui Tao Yingxia Shao Hongzhi Yin

This volume constitutes the papers of several workshops which were held in conjunction with the 28th International Conference on Database Systems for Advanced Applications, DASFAA 2023, held in Tanjin, China, in April 2023. The 23 revised full papers presented in this book were carefully reviewed and selected from 40 submissions. DASFAA 2023 presents the following four workshops: 9th International Workshop on Big Data Management and Service (BDMS 2023), 8th International Workshop on Big Data Quality Management (BDQM 2023); 7th International Workshop on Graph Data Management and Analysis (GDMA 2023); 1st International Workshop on Bundle-based Recommendation Systems (BundleRS 2023).

Windows 10: Learn Tips And Tricks On Using Windows 10 Operating System

by Blerton Abazi

Windows 10 Learn tips and trick on using Windows 10 operating system

2021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) Volume 1 (Advances in Intelligent Systems and Computing #1398)

by Jemal Abawajy Zheng Xu Mohammed Atiquzzaman Xiaolu Zhang

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

2021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #81)

by Jemal Abawajy Zheng Xu Mohammed Atiquzzaman Xiaolu Zhang

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users. 1. Highlights recent applications and techniques in cyber intelligence2. Includes the proceedings of the 2021 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2021) 3. Presents a broad range of scientific research on cyber intelligence

Information, Communication and Computing Technology: 8th International Conference, ICICCT 2023, New Delhi, India, May 27, 2023, Revised Selected Papers (Communications in Computer and Information Science #1841)

by Jemal Abawajy Joao Tavares Latika Kharb Deepak Chahal Ali Bou Nassif

This book constitutes the refereed proceedings of the 8th International Conference on Information, Communication and Computing Technology, ICICCT 2023, held in New Delhi, India, during May 27, 2023.The 14 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: global platform for researchers, scientists and practitioners from both academia and industry to present their research and development activities in all the aspects of Pattern Recognition and computational Intelligence techniques.

International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications And Techniques In Cyber Security And Intelligence (Advances In Intelligent Systems and Computing #842)

by Jemal Abawajy Kim-Kwang Raymond Choo Rafiqul Islam Zheng Xu Mohammed Atiquzzaman

The book highlights innovative ideas, cutting-edge findings, and novel techniques, methods and applications touching on all aspects of technology and intelligence in smart city management and services. Above all, it explores developments and applications that are of practical use and value for Cyber Intelligence-related methods, which are frequently used in the context of city management and services.

International Conference on Applications and Techniques in Cyber Security and Intelligence

by Jemal Abawajy Kim-Kwang Raymond Choo Rafiqul Islam

This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electronic security and intelligence.

Tenth International Conference on Applications and Techniques in Cyber Intelligence: Volume 1 (Lecture Notes on Data Engineering and Communications Technologies #170)

by Jemal H. Abawajy Xiaolu Zhang Mohammed Atiquzzaman Zheng Xu

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

Tenth International Conference on Applications and Techniques in Cyber Intelligence: Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #169)

by Jemal H. Abawajy Zheng Xu Mohammed Atiquzzaman Xiaolu Zhang

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

Proceedings of the International Conference on Data Engineering 2015 (Lecture Notes in Electrical Engineering #520)

by Jemal H. Abawajy Mohamed Othman Rozaida Ghazali Mustafa Mat Deris Hairulnizam Mahdin Tutut Herawan

These proceedings gather outstanding research papers presented at the Second International Conference on Data Engineering 2015 (DaEng-2015) and offer a consolidated overview of the latest developments in databases, information retrieval, data mining and knowledge management. The conference brought together researchers and practitioners from academia and industry to address key challenges in these fields, discuss advanced data engineering concepts and form new collaborations. The topics covered include but are not limited to: • Data engineering • Big data • Data and knowledge visualization • Data management • Data mining and warehousing • Data privacy & security • Database theory • Heterogeneous databases • Knowledge discovery in databases • Mobile, grid and cloud computing • Knowledge management • Parallel and distributed data • Temporal data • Web data, services and information engineering • Decision support systems • E-Business engineering and management • E-commerce and e-learning • Geographical information systems • Information management • Information quality and strategy • Information retrieval, integration and visualization • Information security • Information systems and technologies

Security in Computing and Communications

by Jemal H. Abawajy Sougata Mukherjea Sabu M. Thampi Antonio Ruiz-Martínez

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.

2020 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2020) (Advances in Intelligent Systems and Computing #1244)

by Jemal H. Abawajy Kim-Kwang Raymond Choo Zheng Xu Mohammed Atiquzzaman

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019: Applications and Techniques in Cyber Intelligence (Advances in Intelligent Systems and Computing #1017)

by Jemal H. Abawajy Kim-Kwang Raymond Choo Rafiqul Islam Zheng Xu Mohammed Atiquzzaman

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to be able to secure our cyberfuture. The approaches and findings described in this book are of interest to businesses and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

Refine Search

Showing 54,401 through 54,425 of 54,475 results