- Table View
- List View
Prototyping Python Dashboards for Scientists and Engineers: Build and Deploy a Complete Dashboard with Python
by Padraig HoulahanCreate interactive and data-driven dashboards using Python. This hands-on guide is a practical resource for those (with modest programming skills) in scientific and engineering fields looking to leverage Python's power for data visualization and analysis in a user-friendly dashboard format. You’ll begin by gaining a fundamental understanding of Python programming, including data types, lists, dictionaries, and data structures. The book then delves into the world of reactive programming with Plotly and Dash, offering a hands-on approach to building interactive web-based dashboards. Next, you’ll see how to work with online data, how to scrape and clean datasets, and keep files up-to-date. The book also guides you through planning a dashboard prototype, outlining project tasks, trends, forecasts, spectra, and other design considerations. It concludes with a discussion of how the dashboard can be used for data visualization of real data, explaining the usefulness of tools such as spectra. By providing detailed examples for download and customization, Prototyping Python Dashboards for Scientists and Engineers will equip you with the skills needed to jumpstart your own development efforts. What You’ll Learn Design a dashboard with PythonConvert and filter Excel formatted files to produce CSV filesCreate browser-served graphics with PLOTLYGenerate polynomial trend lines for forecastingBuild a Unix service to share your dashboard Who This Book Is For Scientists, engineers, students, programmers, and data enthusiasts who aspire to harness Python's potential for data visualization and analysis through the creation of interactive dashboards. Many will be pragmatic programmers with modest skills and limited resources who mainly want to see a working solution they could emulate.
Prototyping User eXperience in eXtended Reality (SpringerBriefs in Applied Sciences and Technology)
by Monica Bordegoni Marina Carulli Elena SpadoniThis book examines two topics in the context of product design and enabling technologies: User eXperience (UX) and eXtended Reality (XR). UX regards the ways in which people interact with the environment and with objects and is considered of primary importance in many contexts. When developing new products, UX must be carefully designed and evaluated directly with the users. Prototyping is a well-known, effective, and widely used practice for design evaluation. The book describes how prototyping based on XR technologies, including Virtual, Augmented and Mixed Reality, is a suitable approach for testing ideas and products without fully physically building them. The major benefits, which are well explained and demonstrated in this book, consist in allowing users to experience products, including their appearance, functions, and usability, in a digital context that can be easily modified and customized according to the users’ feedback and the context of use. The audience of the book includes graduate students who wish to learn more about prototyping methods and technologies and product and digital application designers who can deepen their knowledge on advanced digital technologies for evaluating the designs of products and experiences.
The Protractor Handbook: Understanding and Implementing the Tool Effectively
by Shashank ShuklaLearn to quickly set up Protractor and dive into the amazing possibilities that this tool offers for automating browser interactions for a user for any Angular web application. Software testing is here to stay, and an integral part of this is test automation. Protractor is one of the most evolved test automation frameworks that every software testing professional working with an Angular application should know.You will to automate a vast range of actions that a user takes to interact with the browser. From a simple ‘click’ to more complex user actions such as frame switches, selecting from drop-downs, and file downloads using Protractor APIs for Angular-based websites. You will also learn about assertions, timeouts, waits, parallel testing frameworks that are available, and the general pros and cons you should be aware of. With over 150 working code samples demonstrating various test scenarios that you require in your day-to-day automation testing, and examples that may be given in interviews, this book will be your practical handbook to all the key Protractor API implementations. What You'll Learn Set up and install Protractor efficientlyImplement Angular-specific locator strategiesAutomate Angular web pagesRun parallel execution using ProtractorExplore all the pros, cons and challenges you may face while using ProtractorUse specific notes around each API to ensure optimum usage and avoid common mistakes Who This Book Is For Ideal for test engineers who have a basic understanding of test automation with Selenium, developers who want to implement this testing tool for internal testing, Test Managers/IT Project Managers who want to get some general understanding of this tool and its advantages, and students who want to pursue career in test automation.
Provable and Practical Security: 16th International Conference, ProvSec 2022, Nanjing, China, November 11–12, 2022, Proceedings (Lecture Notes in Computer Science #13600)
by Chunpeng Ge Fuchun GuoThis book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11–12,2022. The 15 full papers and 4 short papers were presented carefully reviewed and selected from 52 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Encryption; Lattice Based Cryptography; Information Security; Blockchain; and Foundations.
Provable and Practical Security: 15th International Conference, ProvSec 2021, Guangzhou, China, November 5–8, 2021, Proceedings (Lecture Notes in Computer Science #13059)
by Qiong Huang Yu YuThis book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols.
Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings (Lecture Notes in Computer Science #12505)
by Khoa Nguyen Wenling Wu Kwok Yan Lam Huaxiong WangThis book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020. The 20 full papers presented were carefully reviewed and selected from 59 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: signature schemes, encryption schemes and NIZKS, secure machine learning and multiparty computation, secret sharing schemes, and security analyses.* The conference was held virtually due to the COVID-19 pandemic.
Provable and Practical Security: 17th International Conference, ProvSec 2023, Wuhan, China, October 20–22, 2023, Proceedings (Lecture Notes in Computer Science #14217)
by Mingwu Zhang Man Ho Au Yudi ZhangThis volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.
Provable Security
by Man-Ho Au Atsuko MiyajiThis book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are grouped in topical sections on fundamental, protocol, authenticated encryption and key exchange, encryption and identification, privacy and cloud, leakage-resilient cryptography and lattice cryptography, signature and broadcast encryption.
Provable Security: 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings (Lecture Notes in Computer Science #11192)
by Joonsang Baek Willy Susilo Jongkil KimThis book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications.
Provable Security
by Liqun Chen Jinguang HanThis book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016. The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The papers are grouped in topical sections on attribute/role-based cryptography, data in cloud, searchable encryption, key management, encryption, leakage analysis, homomorphic encryption.
Provable Security
by Tatsuaki Okamoto Yong Yu Man Ho Au Yannan LiThis book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols.
Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings (Lecture Notes in Computer Science #11821)
by Ron Steinfeld Tsz Hon YuenThis book constitutes the refereed proceedings of the 13th International Conference on Provable Security, ProvSec 2019, held in Cairns, QLD, Australia, in October 2019. The 18 full and 6 short papers presented were carefully reviewed and selected from 51 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives, including a special theme on “Practical Security.”
Provably Correct Systems
by Mike G. Hinchey Jonathan P. Bowen Ernst-Rüdiger OlderogAs computers increasingly control the systems and services we depend upon within our daily lives like transport, communications, and the media, ensuring these systems function correctly is of utmost importance. This book consists of twelve chapters and one historical account that were presented at a workshop in London in 2015, marking the 25th anniversary of the European ESPRIT Basic Research project 'ProCoS' (Provably Correct Systems). The ProCoS I and II projects pioneered and accelerated the automation of verification techniques, resulting in a wide range of applications within many trades and sectors such as aerospace, electronics, communications, and retail. The following topics are covered: An historical account of the ProCoS project Hybrid Systems Correctness of Concurrent Algorithms Interfaces and Linking Automatic Verification Run-time Assertions Checking Formal and Semi-Formal Methods Provably Correct Systems provides researchers, designers and engineers with a complete overview of the ProCoS initiative, past and present, and explores current developments and perspectives within the field.
Provenance and Annotation of Data and Processes: 7th International Provenance and Annotation Workshop, IPAW 2018, London, UK, July 9-10, 2018, Proceedings (Lecture Notes in Computer Science #11017)
by Khalid Belhajjame Ashish Gehani Pinar AlperThis book constitutes the refereed proceedings of the 7th International Provenance and Annotation Workshop, IPAW 2018, held in London, UK, in July 2018.The 12 revised full papers, 19 poster papers, and 2 demonstration papers presented were carefully reviewed and selected from 50 submissions. The papers feature a variety of provenance-related topics ranging from the capture and inference of provenance to its use and application.They are organized in topical sections on reproducibility; modeling, simulating and capturing provenance; PROV extensions; scientific workflows; applications; and system demonstrations.
Provenance and Annotation of Data and Processes: 8th and 9th International Provenance and Annotation Workshop, IPAW 2020 + IPAW 2021, Virtual Event, July 19–22, 2021, Proceedings (Lecture Notes in Computer Science #12839)
by Boris Glavic Vanessa Braganholo David KoopThis book constitutes the proceedings of the 8th and 9th International Provenance and Annotation Workshop, IPAW 2020 and IPAW 2021 which were held as part of ProvenanceWeek in 2020 and 2021. Due to the COVID-19 pandemic, PropvenanceWeek 2020 was held as a 1-day virtual event with brief teaser talks on June 22, 2020. In 2021, the conference was held virtually during July 19-22, 2021. The 11 full papers and 12 posters and system demonstrations included in these proceedings were carefully reviewed and selected from a total of 31 submissions. They were organized in the following topical sections: provenance capture and representation; security; provenance types, inference, queries and summarization; reliability and trustworthiness; joint IPAW/TaPP poster and demonstration session.
Provenance and Annotation of Data and Processes
by Boris Glavic Marta MattosoThis book constitutes the refereed proceedings of the 6th International Provenance and Annotation Workshop, IPAW 2016, held in McLean, VA, USA, in June 2016. The 12 revised full papers, 14 poster papers, and 2 demonstration papers presented were carefully reviewed and selected from 54 submissions. The papers feature state-of-the-art research and practice around the automatic capture, representation, and use of provenance. They are organized in topical sections on provenance capture, provenance analysis and visualization, and provenance models and applications.
Provenance and Annotation of Data and Processes
by Bertram Ludäscher Beth PlaleThis book constitutes the revised selected papers of the 5th International Provenance and Annotation Workshop, IPAW 2014, held in Cologne, Germany in June 2014. The 14 long papers, 20 short papers and 4 extended abstracts presented were carefully reviewed and selected from 53 submissions. The papers include tools that enable provenance capture from software compilers, from web publications and from scripts, using existing audit logs and employing both static and dynamic instrumentation.
Provenance in Data Science: From Data Models to Context-Aware Knowledge Graphs (Advanced Information and Knowledge Processing)
by Leslie F. Sikos Oshani W. Seneviratne Deborah L. McGuinnessRDF-based knowledge graphs require additional formalisms to be fully context-aware, which is presented in this book. This book also provides a collection of provenance techniques and state-of-the-art metadata-enhanced, provenance-aware, knowledge graph-based representations across multiple application domains, in order to demonstrate how to combine graph-based data models and provenance representations. This is important to make statements authoritative, verifiable, and reproducible, such as in biomedical, pharmaceutical, and cybersecurity applications, where the data source and generator can be just as important as the data itself. Capturing provenance is critical to ensure sound experimental results and rigorously designed research studies for patient and drug safety, pathology reports, and medical evidence generation. Similarly, provenance is needed for cyberthreat intelligence dashboards and attack maps that aggregate and/or fuse heterogeneous data from disparate data sources to differentiate between unimportant online events and dangerous cyberattacks, which is demonstrated in this book. Without provenance, data reliability and trustworthiness might be limited, causing data reuse, trust, reproducibility and accountability issues.This book primarily targets researchers who utilize knowledge graphs in their methods and approaches (this includes researchers from a variety of domains, such as cybersecurity, eHealth, data science, Semantic Web, etc.). This book collects core facts for the state of the art in provenance approaches and techniques, complemented by a critical review of existing approaches. New research directions are also provided that combine data science and knowledge graphs, for an increasingly important research topic.
Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems
by Peter Simon SapatyThe ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implement citywide heterogeneous computer networks and solve distributed problems on them well before the internet. The invented paradigm evolved into Spatial Grasp Technology and resulted in a European patent and eight books. The volumes covered concrete applications in graph and network theory, defense and social systems, crisis management, simulation of global viruses, gestalt theory, collective robotics, space research, and related concepts. The obtained solutions often exhibited high system qualities like global integrity, distributed awareness, and even consciousness. This current book takes these important characteristics as primary research objectives, together with the theory of patterns covering them all. This book is oriented towards system scientists, application programmers, industry managers, defense and security commanders, and university students (especially those interested in advanced MSc and PhD projects on distributed system management), as well as philosophers, psychologists, and United Nations personnel.
Proximity: How Coming Breakthroughs in Just-in-Time Transform Business, Society, and Daily Life
by Kaihan Krippendorff Robert C. WolcottWhat if you could have whatever you want, produced and provided immediately and affordably no matter how customized—with minimal environmental impact? Products, services, and experiences on demand. Just-in-time anything, anywhere, anytime. This radical change is underway, as digital technologies push the production and provision of value ever closer to the moment of demand.Robert C. Wolcott and Kaihan Krippendorff provide an indispensable guide to the Proximity revolution, showing how it’s transforming every industry—and our lives. Offering unparalleled foresight for leaders and innovators, they reveal how pervasive this trend will be. Proximity represents an entirely new way to serve customers, with critical implications for corporate strategy, investing, public policy, supply chain resilience, and sustainability. Incremental changes to existing business models won’t suffice.Through interviews and compelling examples, Proximity shares stories of the people and companies leading the way. The book places rapidly advancing technologies—from generative AI and 3D printing to lab-grown meats, renewable energy, and virtual reality—in context and explores the factors accelerating the transformation.Proximity offers a playbook for business leaders, investors, and entrepreneurs to win this rapidly emerging game—and for each of us to consider the implications for our careers, families, communities, and lives.
Proximity and Epidata: Attributes and Meaning Modification (Synthesis Lectures on Information Concepts, Retrieval, and Services)
by Laurie J. Bonnici Brian C. O'ConnorThis book provides a new model to explore discoverability and enhance the meaning of information. The authors have coined the term epidata, which includes items and circumstances that impact the expression of the data in a document, but are not part of the ordinary process of retrieval systems. Epidata affords pathways and points to details that cast light on proximities that might otherwise go unknown. In addition, epidata are clues to mis-and dis-information discernment. There are many ways to find needed information; however, finding the most useable information is not an easy task. The book explores the uses of proximity and the concept of epidata that increases the probability of finding functional information. The authors sketch a constellation of proximities, present examples of attempts to accomplish proximity, and provoke a discussion of the role of proximity in the field. In addition, the authors suggest that proximity is a thread between retrieval constructs based on known topics, predictable relations, and types of information seeking that lie outside constructs such as browsing, stumbling, encountering, detective work, art making, and translation.
Proxmox Cookbook
by Wasim AhmedOver 60 hands-on recipes to perform server virtualization and manage virtualized server solutions with Proxmox About This Book * Learn the process of installing, configuring, and managing Proxmox clusters * Explore ways of integrating various storage systems with Proxmox * Step-by-step and easy-to-learn instructions to build virtual environments of any size using Proxmox Who This Book Is For This book is perfect for system administrators who want to learn to implement and administer Proxmox VE environments. Since this book will not cover the basics of Proxmox, a basic understanding of virtualization and networking with Proxmox VE is required. What You Will Learn * Install and configure an enterprise grade, cluster-based virtual environment using Proxmox * Manage a cluster with Graphical User Interface using datacenter, node, KVM, and OpenVZ menus among others * Learn different ways of configuring your network and clusters to create complex cloud services * Configure and manage the built-in Proxmox firewall to protect your virtual environment * Integrate storage systems such as Ceph, Sheepdog, and ZFS for virtual machine management to suit your business needs * Backup and restore your data via stop suspend, and snapshot modes * Upgrade a Proxmox node with new releases and apply update patches through GUI or CLI * Monitor the resources and virtual machines to maintain performance and uptime * Explore commands used for Proxmox and Ceph cluster through CLI In Detail Proxmox VE goes head to head with big virtualization platforms without bearing the overheads of high costs and vendor lock-ins. Rock solid stability and extremely easy manageability gives Proxmox VE an edge in the world of virtualization. The Proxmox cluster file system (pmxcfs) is designed uniquely for storage of configuration files with high security and reliability. Its simplicity and robustness make it easy for system administrators to manage their systems efficiently. Proxmox VE's intuitive interface, high availability, and unique central management system puts it on par with the world's best virtualization platforms. Its simplicity and high quality of service is what makes it the foremost choice for most system administrators. Starting with a step-by-step installation of Proxmox nodes along with an illustrated tour of Proxmox graphical user interface where you will spend most of your time managing a cluster, this book will get you up and running with the mechanisms of Proxmox VE. Various entities such as Cluster, Storage, and Firewall are also covered in an easy to understand format. You will then explore various backup solutions and restore mechanisms, thus learning to keep your applications and servers safe. Next, you will see how to upgrade a Proxmox node with a new release and apply update patches through GUI or CLI. Monitoring resources and virtual machines is required on an enterprise level, to maintain performance and uptime; to achieve this, we learn how to monitor host machine resources and troubleshoot common issues in the setup. Finally, we will walk through some advanced configurations for VM followed by a list of commands used for Proxmox and Ceph cluster through CLI. With this focused and detailed guide you will learn to work your way around with Proxmox VE quickly and add to your skillset. Style and approach This book is an inclusive and extensive handbook. It takes a pragmatic approach to complement your system admin skills and accomplish tasks within the Proxmox environment. It consists of illustrations and code-files to help you work with the data as you go from one recipe to the other.
Proxmox High Availability
by Simon M.C. ChengIf you want to know the secrets of virtualization and how to implement high availability on your services, this is the book for you. For those of you who are already using Proxmox, this book offers you the chance to build a high availability cluster with a distributed filesystem to further protect your system from failure.
Prozesse in Industriebetrieben mittels Low-Code-Software digitalisieren: Ein Praxisleitfaden (Intelligente Technische Systeme – Lösungen aus dem Spitzencluster it’s OWL)
by Sven Hinrichsen Stefan Sauer Klaus SchröderIn vielen Unternehmen besteht ein steigender Bedarf an betriebsspezifisch gestalteten Softwareanwendungen, um Geschäftsprozesse zu digitalisieren und zu optimieren. Derzeit sind vor allem IT-Fachkräfte gefordert, diese Anwendungen zu entwickeln. Da in Betrieben vielfach ein Mangel an IT-Fachkräften besteht, ist diese Vorgehensweise zumeist mit langen Bereitstellungszeiten verbunden. Durch die Nutzung der Low-Code-Programmierung ist es hingegen möglich, Softwareanwendungen ohne tiefe Programmierkenntnisse mittels einer grafischen Benutzeroberfläche zu erstellen. Der Vorteil: Es können passgenaue Lösungen in kurzer Zeit entwickelt werden, indem sich Beschäftigte aus Fachabteilungen mit ihrem Expertenwissen direkt an der Softwareentwicklung beteiligen. Allerdings fehlt es in vielen Betrieben an Wissen zu den Anwendungsmöglichkeiten und -grenzen dieser Art der Programmierung. Zudem ist es derzeit für potenzielle Anwender oftmals unklar, wie eine anforderungsgerechte Low-Code-Plattform ausgewählt und eingeführt werden kann. In diesem Buch werden daher die Herausforderungen bei der Einführung von Low-Code-Plattformen erörtert und umfangreiche Gestaltungsempfehlungen vermittelt, damit es Betrieben gelingt, die wirtschaftlichen Potenziale der Low-Code-Programmierung zu nutzen.
Prozesseigner: Wissen & Methoden für Manager von Unternehmensprozessen (Xpert.press)
by Carlo Simon Bernd HientzschDieses Buch richtet sich gezielt an die große Gruppe der Prozesseigner, die in ihrem Unternehmen für einen oder mehrere Geschäfts- und Produktionsprozesse verantwortlich sind. Ihre Rolle ist wichtig, damit Prozessmanagement insgesamt gelingt. Geschulte Prozesseigner ermöglichen Standards zu etablieren und dezentral erkannte Verbesserungspotenziale zu erschließen. Hierzu müssen sie Führungsverantwortung übernehmen, ohne über disziplinarische Durchgriffsmöglichkeiten zu verfügen. Dieses Buch bietet Prozesseignern praxisnah konkrete Anleitungen, wie sie ihrer Aufgabe gerecht werden.