Browse Results

Showing 42,726 through 42,750 of 60,628 results

Open Problems in Optimization and Data Analysis (Springer Optimization and Its Applications #141)

by Panos M. Pardalos Athanasios Migdalas

Computational and theoretical open problems in optimization, computational geometry, data science, logistics, statistics, supply chain modeling, and data analysis are examined in this book. Each contribution provides the fundamentals needed to fully comprehend the impact of individual problems. Current theoretical, algorithmic, and practical methods used to circumvent each problem are provided to stimulate a new effort towards innovative and efficient solutions. Aimed towards graduate students and researchers in mathematics, optimization, operations research, quantitative logistics, data analysis, and statistics, this book provides a broad comprehensive approach to understanding the significance of specific challenging or open problems within each discipline. The contributions contained in this book are based on lectures focused on “Challenges and Open Problems in Optimization and Data Science” presented at the Deucalion Summer Institute for Advanced Studies in Optimization, Mathematics, and Data Science in August 2016.

Open Problems in Spectral Dimensionality Reduction

by Harry Strange Reyer Zwiggelaar

The last few years have seen a great increase in the amount of data available to scientists, yet many of the techniques used to analyse this data cannot cope with such large datasets. Therefore, strategies need to be employed as a pre-processing step to reduce the number of objects or measurements whilst retaining important information. Spectral dimensionality reduction is one such tool for the data processing pipeline. Numerous algorithms and improvements have been proposed for the purpose of performing spectral dimensionality reduction, yet there is still no gold standard technique. This book provides a survey and reference aimed at advanced undergraduate and postgraduate students as well as researchers, scientists, and engineers in a wide range of disciplines. Dimensionality reduction has proven useful in a wide range of problem domains and so this book will be applicable to anyone with a solid grounding in statistics and computer science seeking to apply spectral dimensionality to their work.

Open Science in Engineering: Proceedings of the 20th International Conference on Remote Engineering and Virtual Instrumentation (Lecture Notes in Networks and Systems #763)

by Michael E. Auer Reinhard Langmann Thrasyvoulos Tsiatsos

The REV Conference is the annual conference of the International Association of Online Engineering (IAOE) together with the Global Online Laboratory Consortium (GOLC).REV 2023 is the 20th in a series of annual events concerning the area of online engineering, cyber-physical systems and Internet of things, including remote engineering and virtual instrumentation.In a globally connected world, the interest in online collaboration, teleworking, remote services, and other digital working environments is rapidly increasing. In response to that, the general objective of this conference is to contribute and discuss fundamentals, applications, and experiences in the field of online and remote engineering, virtual instrumentation, and other related new technologies, including:Cross-realityOpen ScienceInternet of Things and Industrial Internet of ThingsIndustry 4.0Cyber-securityM2M and smart objects.

Open Semantic Technologies for Intelligent System: 10th International Conference, OSTIS 2020, Minsk, Belarus, February 19–22, 2020, Revised Selected Papers (Communications in Computer and Information Science #1282)

by Vladimir Golenkov Victor Krasnoproshin Vladimir Golovko Elias Azarov

This book constitutes the refereed proceedings of the 10th International Conference on Open Semantic Technologies for Intelligent System, OSTIS 2020, held in Minsk, Belarus, in February 2020.The 14 revised full papers and 2 short papers were carefully reviewed and selected from 62 submissions. The papers mainly focus on standardization of intelligent systems and cover wide research fields including knowledge representation and reasoning, semantic networks, natural language processing, temporal reasoning, probabilistic reasoning, multi-agent systems, intelligent agents.

Open-Set Text Recognition: Concepts, Framework, and Algorithms (SpringerBriefs in Computer Science)

by Xu-Cheng Yin Chun Yang Chang Liu

In real-world applications, new data, patterns, and categories that were not covered by the training data can frequently emerge, necessitating the capability to detect and adapt to novel characters incrementally. Researchers refer to these challenges as the Open-Set Text Recognition (OSTR) task, which has, in recent years, emerged as one of the prominent issues in the field of text recognition. This book begins by providing an introduction to the background of the OSTR task, covering essential aspects such as open-set identification and recognition, conventional OCR methods, and their applications. Subsequently, the concept and definition of the OSTR task are presented encompassing its objectives, use cases, performance metrics, datasets, and protocols. A general framework for OSTR is then detailed, composed of four key components: The Aligned Represented Space, the Label-to-Representation Mapping, the Sample-to-Representation Mapping, and the Open-set Predictor. In addition,possible implementations of each module within the framework are discussed. Following this, two specific open-set text recognition methods, OSOCR and OpenCCD, are introduced. The book concludes by delving into applications and future directions of Open-set text recognition tasks.This book presents a comprehensive overview of the open-set text recognition task, including concepts, framework, and algorithms. It is suitable for graduated students and young researchers who are majoring in pattern recognition and computer science, especially interdisciplinary research.

Open Source Data Warehousing and Business Intelligence

by Lakshman Bulusu

Open Source Data Warehousing and Business Intelligence is an all-in-one reference for developing open source based data warehousing (DW) and business intelligence (BI) solutions that are business-centric, cross-customer viable, cross-functional, cross-technology based, and enterprise-wide. Considering the entire lifecycle of an open source DW &

Open Source Enterprise Software

by Alexandra Kees

Anhand eines Marktspiegels erhalten Anwender mit dem Buch einen Überblick über die am Markt angebotene Free and Open Source (FOS) Software im Bereich der Enterprise Resource Planning Systeme (ERP-Systeme). FOS Software ist ein idealer Ansatz zur Kostenminimierung im IT-Bereich - dies gilt insbesondere für FOS ERP-Systeme. Die Durchdringung von Free and Open Source ERP-Systemen ist aber noch sehr gering. Ursache hierfür ist vor allem die Unübersichtlichkeit des Marktes. Ziel des vorliegenden Buches ist es daher, eine praxisnahe Einführung in FOS Unternehmenssoftware zu geben und einen Marktspiegel anzubieten, der als Grundlage für die Softwareauswahl von FOS ERP-Systeme genutzt werden kann.

Open-Source ESBs in Action: Example Implementations in Mule and ServiceMix

by Tijs Rademakers Jos Dirksen

Most modern business systems include independent applications that exchange information with each other-a technique usually called enterprise integration. An architectural approach called the Enterprise Service Bus (ESB) offers developers a way to handle the messages between those independent applications without creating a lot of custom code. While commercial ESB solutions can be quite expensive to implement and maintain, a set of high-quality open source ESB tools offer the same functionality at a substantially lower cost.Open Source ESBs in Action shows you how to implement and use two open source ESB implementations: Mule and ServiceMix. The authors introduce you to these freely-available ESB tools and present practical examples of how to use them in real-world scenarios. You will learn how the various features of an ESB such as transformation, routing, security, connectivity and more can be implemented using Mule and ServiceMix. You will also learn how to solve common enterprise integration problems using a structured approach.Beyond simply learning how Mule and Service Mix work, you'll learn the core techniques of ESB implementation such as Process Choreography, or the implementation of complex business processes through an ESB, and Service Orchestration, or exposing a set of services as a single service. The book shows you the fundamentals of ESB-based event processing and Quality of Service concerns like security, reliable delivery, and transaction management.Working in integration projects is exciting, with new technologies and paradigms arriving every day. Open Source technologies like Mule and ServiceMix both offer lower-cost solutions and a higher degree of innovation than commercial ESB implementations. Open Source ESBs in Action will help you master ESB-driven integration techniques quickly and will provide you with knowledge you need to work effectively with Mule and ServiceMix. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

Open Source for the Enterprise: Managing Risks, Reaping Rewards

by Dan Woods Gautam Guliani

This book provides something far more valuable than either the cheerleading or the fear-mongering one hears about open source. The authors are Dan Woods, former CTO of TheStreet.com and a consultant and author of several books about IT, and Gautam Guliani, Director of Software Architecture at Kaplan Test Prep & Admissions. Each has used open source software for some 15 years at IT departments large and small. They have collected the wisdom of a host of experts from IT departments, open source communities, and software companies. Open Source for the Enterprise provides a top to bottom view not only of the technology, but of the skills required to manage it and the organizational issues that must be addressed.

Open Source Geospatial Science for Urban Studies: The Value of Open Geospatial Data (Lecture Notes in Intelligent Transportation and Infrastructure)

by Amin Mobasheri

This book is mainly focused on two themes: transportation and smart city applications. Open geospatial science and technology is an increasingly important paradigm that offers the opportunity to promote the democratization of geographical information, the transparency of governments and institutions, as well as social, economic and urban opportunities. During the past decade, developments in the area of open geospatial data have greatly increased. The open source GIS research community believes that combining free and open software, open data, as well as open standards, leads to the creation of a sustainable ecosystem for accelerating new discoveries to help solve global cross-disciplinary urban challenges. The vision of this book is to enrich the existing literature on this topic, and act one step towards more sustainable cities through employment of open source GIS solutions that are reproducible. Various contributions are provided and practically implemented in several urban use cases. Therefore, apart from researchers, lecturers and students in the geography/urbanism domain, crowdsourcing and VGI domain, as well as open source GIS domain, it is believed the specialists and mentors in municipalities and urban planning departments as well as professionals in private companies would be interested to read this book.

Open Source Identity Management Patterns and Practices Using OpenAM 10.x

by Waylon Kenning

This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x.Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what's possible and how to quickly implement a prototype. It's assumed that you've had experience with web applications and some knowledge of Apache and Tomcat.

Open Source Intelligence: A Field Manual (River Publishers Series in Computing and Information Science and Technology)

by Varin Khera Anand R. Prasad Suksit Kwanoran

This practical book introduces open-source intelligence (OSINT) and explores how it can be executed in different intelligence scenarios. It covers varying supporting topics, such as online tracking techniques, privacy best practices for OSINT researchers, and practical examples of OSINT investigations. The book also delves into the integration of artificial intelligence (AI) and machine learning (ML) in OSINT, social media intelligence methodologies, and the unique characteristics of the surface web, deep web, and dark web.Open-source intelligence (OSINT) is a powerful tool that leverages publicly available data for security purposes. OSINT derives its value from various sources, including the internet, traditional media, academic publications, corporate papers, and geospatial information.Further topics include an examination of the dark web's uses and potential risks, an introduction to digital forensics and its methods for recovering and analyzing digital evidence, and the crucial role of OSINT in digital forensics investigations. The book concludes by addressing the legal considerations surrounding the use of the information and techniques presented.This book provides a comprehensive understanding of CTI, TI, and OSINT. It sets the stage for the best ways to leverage OSINT to support different intelligence needs to support decision-makers in today's complex IT threat landscape.

Open Source Intelligence and Cyber Crime: Social Media Analytics (Lecture Notes in Social Networks)

by Mohammad A. Tayebi Uwe Glässer David B. Skillicorn

This book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected. Readers will encounter the latest advances in cutting-edge data mining, machine learning and predictive analytics combined with natural language processing and social network analysis to detect, disrupt, and neutralize cyber and physical threats. Chapters contain state-of-the-art social media analytics and open source intelligence research trends. This multidisciplinary volume will appeal to students, researchers, and professionals working in the fields of open source intelligence, cyber crime and social network analytics. Chapter Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Open Source Intelligence in the Twenty-First Century

by Christopher Hobbs Matthew Moran Daniel Salisbury

This edited book provides an insight into the new approaches, challenges and opportunities that characterise open source intelligence (OSINT) at the beginning of the twenty-first century. It does so by considering the impacts of OSINT on three important contemporary security issues: nuclear proliferation, humanitarian crises and terrorism.

Open Source Intelligence Investigation

by Babak Akhgar P. Saskia Bayerl Fraser Sampson

One of the most important aspects for a successful police operation is the ability for the police to obtain timely, reliable and actionable intelligence related to the investigation or incident at hand. Open Source Intelligence (OSINT) provides an invaluable avenue to access and collect such information in addition to traditional investigative techniques and information sources. This book offers an authoritative and accessible guide on how to conduct Open Source Intelligence investigations from data collection to analysis to the design and vetting of OSINT tools. In its pages the reader will find a comprehensive view into the newest methods for OSINT analytics and visualizations in combination with real-life case studies to showcase the application as well as the challenges of OSINT investigations across domains. Examples of OSINT range from information posted on social media as one of the most openly available means of accessing and gathering Open Source Intelligence to location data, OSINT obtained from the darkweb to combinations of OSINT with real-time analytical capabilities and closed sources. In addition it provides guidance on legal and ethical considerations making it relevant reading for practitioners as well as academics and students with a view to obtain thorough, first-hand knowledge from serving experts in the field.

Open Source Intelligence Investigation: From Strategy to Implementation (Advanced Sciences and Technologies for Security Applications)

by Babak Akhgar, P. Saskia Bayerl and Fraser Sampson

One of the most important aspects for a successful police operation is the ability for the police to obtain timely, reliable and actionable intelligence related to the investigation or incident at hand. Open Source Intelligence (OSINT) provides an invaluable avenue to access and collect such information in addition to traditional investigative techniques and information sources. This book offers an authoritative and accessible guide on how to conduct Open Source Intelligence investigations from data collection to analysis to the design and vetting of OSINT tools. In its pages the reader will find a comprehensive view into the newest methods for OSINT analytics and visualizations in combination with real-life case studies to showcase the application as well as the challenges of OSINT investigations across domains. Examples of OSINT range from information posted on social media as one of the most openly available means of accessing and gathering Open Source Intelligence to location data, OSINT obtained from the darkweb to combinations of OSINT with real-time analytical capabilities and closed sources. In addition it provides guidance on legal and ethical considerations making it relevant reading for practitioners as well as academics and students with a view to obtain thorough, first-hand knowledge from serving experts in the field.

Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence

by Nihad A. Hassan Rami Hijazi

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web.The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You’ll Learn Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organizationUse OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackersGather corporate intelligence about business competitors and predict future market directionsConduct advanced searches to gather intelligence from social media sites such as Facebook and TwitterUnderstand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs Who This Book Is For Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises

Open Source Intelligence Techniques: Resources For Searching And Analyzing Online Information

by Michael Bazzell

Author Michael Bazzell has been well known in government circles for his ability to locate personal information about any target through Open Source Intelligence (OSINT). In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will greatly improve anyone's online investigative skills.

Open Source Projects - Beyond Code: A blueprint for scalable and sustainable open source projects

by John Mertic

Accelerate your career and make an impact by launching and running a successful open source project. Purchase of the print or Kindle book includes a free PDF eBookKey FeaturesUnderstand the method and rationale for launching an open source projectExplore best practices and insights for running an open source projectLeverage open source projects to advance your careerBook DescriptionOpen source is ubiquitous in our society, with countless existing projects, and new ones emerging every day. It follows a "scratch-your-own-itch" model where contributors and maintainers drive the project forward. Through Open Source Projects - Beyond Code, you'll learn what it takes to develop a successful, scalable, and sustainable open source project. In this book, you'll explore the full life cycle of open source projects, from inception, through launch, to maturity, and then discover how to sunset an open source project responsibly. Along the way, you'll learn the concepts of licensing, governance, community building, ecosystem management, and growing maintainers and contributors, as well as understand how other open source projects have been successful or might have struggled in some areas. You can use this book as an end-to-end guide or reference material for the future. By the end of this book, you'll be able to accelerate your career in open source. Your newly acquired skills will help you stay ahead of the curve even with the ever-evolving nature of technology.What you will learnExplore what is open source and how you can use it to accelerate your careerStart an open source project while exploring its key considerationsGrow, support, and manage a vast community of developers and usersBuild and maintain a mature and sustainable projectEnable mass users and developers to downstream productization and outreachUse open source as a portfolio to build your careerUnderstand when to end a project and conduct it responsiblyWho this book is forThis book is for software developers, product managers, project managers, business leaders, or general enthusiasts looking to start an open source project or currently maintaining one.

Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC

by Alfred Basta Nadine Basta Waqar Anwar Mohammad Ilyas Essar

A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and hands-on discussion of how to set up and operate a security operations center (SOC) in a way that integrates and optimizes existing security procedures. You’ll explore how to implement and manage every relevant aspect of cybersecurity, from foundational infrastructure to consumer access points. In the book, the authors explain why industry standards have become necessary and how they have evolved – and will evolve – to support the growing cybersecurity demands in this space. Readers will also find: A modular design that facilitates use in a variety of classrooms and instructional settingsDetailed discussions of SOC tools used for threat prevention and detection, including vulnerability assessment, behavioral monitoring, and asset discoveryHands-on exercises, case studies, and end-of-chapter questions to enable learning and retention Perfect for cybersecurity practitioners and software engineers working in the industry, Open-Source Security Operations Center (SOC) will also prove invaluable to managers, executives, and directors who seek a better technical understanding of how to secure their networks and products.

Open Source SOA

by Jeff Davis

You can build a world-class SOA infrastructure entirely using popular, andmature, open-source applications. Unfortunately, the technical documentationfor most open-source projects focuses on a specific product, the big SOA picture.You're left to your own devices to figure out how to cobble together a fullsolution from the various bits. In other words, unless you already know howMule and Tuscany work with jBPM, you're stuck.Open Source SOA shows readers how to build an entire SOA application usingopen-source technologies. It shows readers how to apply key ideas like EnterpriseService Bus (ESB) design and Business Process Management (BPM) and learnthe tools and techniques to implement them effectively.To pull everything together, the author describes real-life case studies from hisown work to tie together all the principles and practices. These hard-to-find casestudies are pure gold for the reader, as most developers keep these trade secretsto themselves. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

Open Source Software for Digital Forensics

by Stefano Zanero Ewa Huebner

Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics. It presents the motivations for using FLOSS applications as tools for collection, preservation and analysis of digital evidence in computer and network forensics. It also covers extensively several forensic FLOSS tools, their origins and evolution. Open Source Software for Digital Forensics is based on the OSSCoNF workshop, which was held in Milan, Italy, September 2008 at the World Computing Congress, co-located with OSS 2008. This edited volume is a collection of contributions from researchers and practitioners world wide. Open Source Software for Digital Forensics is designed for advanced level students and researchers in computer science as a secondary text and reference book. Computer programmers, software developers, and digital forensics professionals will also find this book to be a valuable asset.

Open Source Strategies for the Enterprise

by Simon Phipps

So you're thinking of creating an open source community around your code? Here are some things you ought to know before you make your plans too firm.Community Types: There is no single "open source community." Rather, there are many groups of people gathered around many free software commons. Those gatherings are themselves of several different types; you really need to understand those differences.Payment at the Point of Value: Open source is of course free software. But the freedom you're finding brings you value varies depending on the role you play with respect to the software. "Free" doesn't mean the same to everyone.Open Core Is Bad For You: The "open core" business model is popular with VC-funded startup companies but does not deliver the core freedoms from which lasting business value for customers is derived.Transparency and Privacy: The key success factor in an open source community is the equality of all the participants. A strong community is characterized by high levels of transparency about the project coupled with strong respect for the privacy of the participants. Read why you should not impose your business model on anyone.

Open Source Systems: 15th IFIP WG 2.13 International Conference, OSS 2019, Montreal, QC, Canada, May 26–27, 2019, Proceedings (IFIP Advances in Information and Communication Technology #556)

by Francis Bordeleau Alberto Sillitti Paulo Meirelles Valentina Lenarduzzi

This open access book constitutes the refereed proceedings of the 15th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2019, held in Montreal, Quebec, Canada, in May 2019.The 10 revised full papers and 5 short papers presented were carefully reviewed and selected from 35 submissions. The papers cover a wide range of topics in the field of free/libre open source software (FLOSS) and are organized in the following thematic sections: mining OSS data; organizational aspects of FLOSS projects; FLOSS adoption; FLOSS cost and licenses; and FLOSS education and training.

Open Source Systems: Integrating Communities

by Kevin Crowston Imed Hammouda Björn Lundell Gregorio Robles Jonas Gamalielsson Juho Lindman

This book constitutes the refereed proceedings of the 12th International IFIP WG 2. 13 International Conference on Open Source Systems, OSS 2016, held in Gothenburg, Sweden, in May/June 2016. The 13 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers cover a wide range of topics related to free, libre, and open source software, including: organizational aspects of communities; organizational adoption; participation of women; software maintenance and evolution; open standards and open data; collaboration; hybrid communities; code reviews; and certification.

Refine Search

Showing 42,726 through 42,750 of 60,628 results