Browse Results

Showing 876 through 900 of 56,825 results

Advanced Analytics in Mining Engineering: Leverage Advanced Analytics in Mining Industry to Make Better Business Decisions

by Ali Soofastaei

In this book, Dr. Soofastaei and his colleagues reveal how all mining managers can effectively deploy advanced analytics in their day-to-day operations- one business decision at a time.Most mining companies have a massive amount of data at their disposal. However, they cannot use the stored data in any meaningful way. The powerful new business tool-advanced analytics enables many mining companies to aggressively leverage their data in key business decisions and processes with impressive results.From statistical analysis to machine learning and artificial intelligence, the authors show how many analytical tools can improve decisions about everything in the mine value chain, from exploration to marketing.Combining the science of advanced analytics with the mining industrial business solutions, introduce the “Advanced Analytics in Mining Engineering Book” as a practical road map and tools for unleashing the potential buried in your company’s data.The book is aimed at providing mining executives, managers, and research and development teams with an understanding of the business value and applicability of different analytic approaches and helping data analytics leads by giving them a business framework in which to assess the value, cost, and risk of potential analytical solutions. In addition, the book will provide the next generation of miners – undergraduate and graduate IT and mining engineering students – with an understanding of data analytics applied to the mining industry. By providing a book with chapters structured in line with the mining value chain, we will provide a clear, enterprise-level view of where and how advanced data analytics can best be applied. This book highlights the potential to interconnect activities in the mining enterprise better. Furthermore, the book explores the opportunities for optimization and increased productivity offered by better interoperability along the mining value chain – in line with the emerging vision of creating a digital mine with much-enhanced capabilities for modeling, simulation, and the use of digital twins – in line with leading “digital” industries.

Advanced Analytics in Power BI with R and Python: Ingesting, Transforming, Visualizing

by Ryan Wade

This easy-to-follow guide provides R and Python recipes to help you learn and apply the top languages in the field of data analytics to your work in Microsoft Power BI. Data analytics expert and author Ryan Wade shows you how to use R and Python to perform tasks that are extremely hard, if not impossible, to do using native Power BI tools. For example, you will learn to score Power BI data using custom data science models and powerful models from Microsoft Cognitive Services. The R and Python languages are powerful complements to Power BI. They enable advanced data transformation techniques that are difficult to perform in Power BI in its default configuration but become easier by leveraging the capabilities of R and Python. If you are a business analyst, data analyst, or a data scientist who wants to push Power BI and transform it from being just a business intelligence tool into an advanced data analytics tool, then this is the book to help you do that. What You Will Learn Create advanced data visualizations via R using the ggplot2 package Ingest data using R and Python to overcome some limitations of Power Query Apply machine learning models to your data using R and Python without the need of Power BI premium compacity Incorporate advanced AI in Power BI without the need of Power BI premium compacity via Microsoft Cognitive Services, IBM Watson Natural Language Understanding, and pre-trained models in SQL Server Machine Learning Services Perform advanced string manipulations not otherwise possible in Power BI using R and Python Who This Book Is For Power users, data analysts, and data scientists who want to go beyond Power BI’s built-in functionality to create advanced visualizations, transform data in ways not otherwise supported, and automate data ingestion from sources such as SQL Server and Excel in a more concise way

Advanced Analytics with Spark

by Sean Owen Sandy Ryza Josh Wills Uri Laserson

In this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark. The authors bring Spark, statistical methods, and real-world data sets together to teach you how to approach analytics problems by example.You'll start with an introduction to Spark and its ecosystem, and then dive into patterns that apply common techniques--classification, collaborative filtering, and anomaly detection among others--to fields such as genomics, security, and finance. If you have an entry-level understanding of machine learning and statistics, and you program in Java, Python, or Scala, you'll find these patterns useful for working on your own data applications.Patterns include:Recommending music and the Audioscrobbler data setPredicting forest cover with decision treesAnomaly detection in network traffic with K-means clusteringUnderstanding Wikipedia with Latent Semantic AnalysisAnalyzing co-occurrence networks with GraphXGeospatial and temporal data analysis on the New York City Taxi Trips dataEstimating financial risk through Monte Carlo simulationAnalyzing genomics data and the BDG projectAnalyzing neuroimaging data with PySpark and Thunder

Advanced Analytics with Spark: Patterns for Learning from Data at Scale

by Josh Wills Sandy Ryza Sean Owen Uri Laserson

In the second edition of this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark. The authors bring Spark, statistical methods, and real-world data sets together to teach you how to approach analytics problems by example. Updated for Spark 2.1, this edition acts as an introduction to these techniques and other best practices in Spark programming.You’ll start with an introduction to Spark and its ecosystem, and then dive into patterns that apply common techniques—including classification, clustering, collaborative filtering, and anomaly detection—to fields such as genomics, security, and finance.If you have an entry-level understanding of machine learning and statistics, and you program in Java, Python, or Scala, you’ll find the book’s patterns useful for working on your own data applications.With this book, you will:Familiarize yourself with the Spark programming modelBecome comfortable within the Spark ecosystemLearn general approaches in data scienceExamine complete implementations that analyze large public data setsDiscover which machine learning tools make sense for particular problemsAcquire code that can be adapted to many uses

Advanced Analytics with Transact-SQL: Exploring Hidden Patterns and Rules in Your Data

by Dejan Sarka

Learn about business intelligence (BI) features in T-SQL and how they can help you with data science and analytics efforts without the need to bring in other languages such as R and Python. This book shows you how to compute statistical measures using your existing skills in T-SQL. You will learn how to calculate descriptive statistics, including centers, spreads, skewness, and kurtosis of distributions. You will also learn to find associations between pairs of variables, including calculating linear regression formulas and confidence levels with definite integration. No analysis is good without data quality. Advanced Analytics with Transact-SQL introduces data quality issues and shows you how to check for completeness and accuracy, and measure improvements in data quality over time. The book also explains how to optimize queries involving temporal data, such as when you search for overlapping intervals. More advanced time-oriented information in the book includes hazard and survival analysis. Forecasting with exponential moving averages and autoregression is covered as well. Every web/retail shop wants to know the products customers tend to buy together. Trying to predict the target discrete or continuous variable with few input variables is important for practically every type of business. This book helps you understand data science and the advanced algorithms use to analyze data, and terms such as data mining, machine learning, and text mining.Key to many of the solutions in this book are T-SQL window functions. Author Dejan Sarka demonstrates efficient statistical queries that are based on window functions and optimized through algorithms built using mathematical knowledge and creativity. The formulas and usage of those statistical procedures are explained so you can understand and modify the techniques presented. T-SQL is supported in SQL Server, Azure SQL Database, and in Azure Synapse Analytics. There are so many BI features in T-SQL that it might become your primary analytic database language. If you want to learn how to get information from your data with the T-SQL language that you already are familiar with, then this is the book for you. What You Will LearnDescribe distribution of variables with statistical measuresFind associations between pairs of variablesEvaluate the quality of the data you are analyzingPerform time-series analysis on your dataForecast values of a continuous variablePerform market-basket analysis to predict customer purchasing patternsPredict target variable outcomes from one or more input variablesCategorize passages of text by extracting and analyzing keywordsWho This Book Is ForDatabase developers and database administrators who want to translate their T-SQL skills into the world of business intelligence (BI) and data science. For readers who want to analyze large amounts of data efficiently by using their existing knowledge of T-SQL and Microsoft’s various database platforms such as SQL Server and Azure SQL Database. Also for readers who want to improve their querying by learning new and original optimization techniques.

Advanced and Intelligent Computations in Diagnosis and Control (Advances in Intelligent Systems and Computing #386)

by Zdzisław Kowalczuk

This book is devoted to the demands of research and industrial centers for diagnostics, monitoring and decision making systems that result from the increasing complexity of automation and systems, the need to ensure the highest level of reliability and safety, and continuing research and the development of innovative approaches to fault diagnosis. The contributions combine domains of engineering knowledge for diagnosis, including detection, isolation, localization, identification, reconfiguration and fault-tolerant control. The book is divided into six parts: (I) Fault Detection and Isolation; (II) Estimation and Identification; (III) Robust and Fault Tolerant Control; (IV) Industrial and Medical Diagnostics; (V) Artificial Intelligence; (VI) Expert and Computer Systems.

Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE

by Prabath Siriwardena

Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. API adoption in both consumer and enterprises has gone beyond predictions. It has become the 'coolest' way of exposing business functionalities to the outside world. Both your public and private APIs, need to be protected, monitored and managed. Security is not an afterthought, but API security has evolved a lot in last five years. The growth of standards, out there, has been exponential. That's where AdvancedAPI Security comes in--to wade through the weeds and help you keep the bad guys away while realizing the internal and external benefits of developing APIs for your services. Our expert author guides you through the maze of options and shares industry leading best practices in designing APIs for rock-solid security. The book will explain, in depth, securing APIs from quite traditional HTTP Basic Authentication to OAuth 2. 0 and the standards built around it. Build APIs with rock-solid security today with Advanced API Security. Takes you through the best practices in designing APIs for rock-solid security. Provides an in depth tutorial of most widely adopted security standards for API security. Teaches you how to compare and contrast different security standards/protocols to find out what suits your business needs the best.

Advanced API Security: OAuth 2.0 and Beyond

by Prabath Siriwardena

Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about TLS Token Binding, User Managed Access (UMA) 2.0, Cross Origin Resource Sharing (CORS), Incremental Authorization, Proof Key for Code Exchange (PKCE), and Token Exchange. Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits. Security must be an integral part of any development project. This book shares best practices in designing APIs for rock-solid security. API security has evolved since the first edition of this book, and the growth of standards has been exponential. OAuth 2.0 is the most widely adopted framework that is used as the foundation for standards, and this book shows you how to apply OAuth 2.0 to your own situation in order to secure and protect your enterprise APIs from exploitation and attack. What You Will LearnSecurely design, develop, and deploy enterprise APIsPick security standards and protocols to match business needsMitigate security exploits by understanding the OAuth 2.0 threat landscapeFederate identities to expand business APIs beyond the corporate firewallProtect microservices at the edge by securing their APIsDevelop native mobile applications to access APIs securelyIntegrate applications with SaaS APIs protected with OAuth 2.0Who This Book Is ForEnterprise security architects who are interested in best practices around designing APIs. The book is also for developers who are building enterprise APIs and integrating with internal and external applications.

Advanced Applications of Blockchain Technology (Studies in Big Data #60)

by Shiho Kim Ganesh Chandra Deka

This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains. It presents various applications that are helpful for research scholars and scientists who are working toward identifying and pinpointing the potential of as well as the hindrances to this technology.

Advanced Applications of Computational Mathematics: Theoretical Advances And Advanced Applications (De Gruyter Series On The Applications Of Mathematics In Engineering And Information Sciences Ser. #3)

by Akshay Kumar Mangey Ram Hari Mohan Srivastava

This book “Advanced Applications of Computational Mathematics” covers multidisciplinary studies containing advanced research in the field of computational and applied mathematics. The book includes research methodology, techniques, applications, and algorithms. The book will be very useful to advanced students, researchers and practitioners who are involved in the areas of computational and applied mathematics and engineering.

Advanced Applications of Natural Language Processing for Performing Information Extraction (SpringerBriefs in Speech Technology)

by António Teixeira Mário Rodrigues

This book explains how can be created information extraction (IE) applications that are able to tap the vast amount of relevant information available in natural language sources: Internet pages, official documents such as laws and regulations, books and newspapers, and social web. Readers are introduced to the problem of IE and its current challenges and limitations, supported with examples. The book discusses the need to fill the gap between documents, data, and people, and provides a broad overview of the technology supporting IE. The authors present a generic architecture for developing systems that are able to learn how to extract relevant information from natural language documents, and illustrate how to implement working systems using state-of-the-art and freely available software tools. The book also discusses concrete applications illustrating IE uses. · Provides an overview of state-of-the-art technology in information extraction (IE), discussing achievements and limitations for the software developer and providing references for specialized literature in the area · Presents a comprehensive list of freely available, high quality software for several subtasks of IE and for several natural languages · Describes a generic architecture that can learn how to extract information for a given application domain

Advanced Applied Deep Learning: Convolutional Neural Networks and Object Detection

by Umberto Michelucci

Develop and optimize deep learning models with advanced architectures. This book teaches you the intricate details and subtleties of the algorithms that are at the core of convolutional neural networks. In Advanced Applied Deep Learning, you will study advanced topics on CNN and object detection using Keras and TensorFlow. Along the way, you will look at the fundamental operations in CNN, such as convolution and pooling, and then look at more advanced architectures such as inception networks, resnets, and many more. While the book discusses theoretical topics, you will discover how to work efficiently with Keras with many tricks and tips, including how to customize logging in Keras with custom callback classes, what is eager execution, and how to use it in your models. Finally, you will study how object detection works, and build a complete implementation of the YOLO (you only look once) algorithm in Keras and TensorFlow. By the end of the book you will have implemented various models in Keras and learned many advanced tricks that will bring your skills to the next level.What You Will Learn See how convolutional neural networks and object detection workSave weights and models on diskPause training and restart it at a later stage Use hardware acceleration (GPUs) in your codeWork with the Dataset TensorFlow abstraction and use pre-trained models and transfer learningRemove and add layers to pre-trained networks to adapt them to your specific projectApply pre-trained models such as Alexnet and VGG16 to new datasets Who This Book Is For Scientists and researchers with intermediate-to-advanced Python and machine learning know-how. Additionally, intermediate knowledge of Keras and TensorFlow is expected.

Advanced Arduino Techniques in Science: Refine Your Skills and Projects with PCs or Python-Tkinter

by Richard J. Smythe

If you’re already a comfortable programmer, familiar with your single board computer and microcontroller, and are ready to refine your projects, then let’s get started! This book covers advanced methods and techniques for creating, implementing, monitoring and controlling your experiments and projects with your Raspberry Pi and Arduino. Projects will use Python and the Tkinter GUI and will also cover software development for adding real time data display to the Raspberry Pi.You'll review concepts of frequency occurring in nature and the techniques used to measure the frequency of electrically varying signal voltages. You'll also study procedures for safe design, implementation and operation of experimental measurement systems operating at high heats and high temperatures. Throughout the book you'll look at sources and types of errors, and best practices for minimizing and reducing them.Often times there are simple environmental issues hindering what would seem to be simple projects: high temperatures, controlling the power for elevated temperature with the proportional integral and derivative (PID) algorithm, and the limitations imposed by eight bit code, the influence of noise and errors in measured data, and many more. Advanced Arduino Techniques in Science provides the best tools to move past those restrictions. What You’ll LearnImplement an experimental control system and graphical data display for the Raspberry Pi and ArduinoManage experimental control with PID algorithm implementation, tuning and limitations imposed by eight bit digital signalsBuild an analytical front end Examine data smoothing capability of the Kalman filterExplore available methods for measuring both high and low frequency values in electronic signalsWho This Book Is ForEducators, researchers, students, makers, citizen scientists, or hobbyists can all extend their measuring capability or improve upon the quality of their collected data. The book is directed to those with intermediate skills in programming and those who are comfortable with Python programming and Arduino C.

Advanced Artificial Intelligence and Robo-Justice

by Georgios I. Zekos

The book deals with digital technology which is transforming the landscape of dispute resolution. It illustrates the application of AI in the legal field and shows the future prospect of robo-justice for an AAI society in the advanced artificial intelligence era. In other words, the present justice system and the influence of current AI upon courts and arbitration are investigated. The transforming role of AI on all legal fields is examined thoroughly by giving answers concerning AI legal personality and liability. The analysis shows that digital technology is generating an ever-growing number of disputes and at the same time is challenging the effectiveness and reach of traditional dispute resolution avenues. To that extent, the book presents in tandem the impact of AI upon courts and arbitration, and reveals the role of AAI in generating a new robo-justice system.Finally, the end of the perplexing relation of courts and arbitration is evidenced methodically and comprehensively.

Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website

by Scott Norberg

Incorporate security best practices into ASP.NET Core. This book covers security-related features available within the framework, explains where these feature may fall short, and delves into security topics rarely covered elsewhere. Get ready to dive deep into ASP.NET Core 3.1 source code, clarifying how particular features work and addressing how to fix problems. For straightforward use cases, the ASP.NET Core framework does a good job in preventing certain types of attacks from happening. But for some types of attacks, or situations that are not straightforward, there is very little guidance available on how to safely implement solutions. And worse, there is a lot of bad advice online on how to implement functionality, be it encrypting unsafely hard-coded parameters that need to be generated at runtime, or articles which advocate for certain solutions that are vulnerable to obvious injection attacks. Even more concerning is the functions in ASP.NET Core that are not as secure as they should be by default.Advanced ASP.NET Core 3 Security is designed to train developers to avoid these problems. Unlike the vast majority of security books that are targeted to network administrators, system administrators, or managers, this book is targeted specifically to ASP.NET developers. Author Scott Norberg begins by teaching developers how ASP.NET Core works behind the scenes by going directly into the framework's source code. Then he talks about how various attacks are performed using the very tools that penetration testers would use to hack into an application. He shows developers how to prevent these attacks. Finally, he covers the concepts developers need to know to do some testing on their own, without the help of a security professional. What You Will Learn Discern which attacks are easy to prevent, and which are more challenging, in the frameworkDig into ASP.NET Core 3.1 source code to understand how the security services workEstablish a baseline for understanding how to design more secure softwareProperly apply cryptography in software developmentTake a deep dive into web security conceptsValidate input in a way that allows legitimate traffic but blocks malicious traffic Understand parameterized queries and why they are so important to ASP.NET CoreFix issues in a well-implemented solution Know how the new logging system in ASP.NET Core falls short of security needsIncorporate security into your software development process Who This Book Is ForSoftware developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET Core. A basic understanding of web technologies such as HTML, JavaScript, and CSS is assumed, as is knowledge of how to create a website, and how to read and write C#. You do not need knowledge of security concepts, even those that are often covered in ASP.NET Core documentation.

Advanced ASP.NET Core 8 Security: Move Beyond ASP.NET Documentation and Learn Real Security

by Scott Norberg

Most .NET developers do not incorporate security best practices when creating websites. The problem? Even if you use all of the best practices that the ASP.NET team recommends, you are still falling short in several key areas due to issues within the framework itself. And most developers don’t use all of the best practices that are recommended. If you are interested in truly top-notch security, available sources don’t give you the information you need. Most blogs and other books simply state how to use the configurations within ASP.NET, but do not teach you security as understood by security professionals. Online code samples aren't much help because they are usually written by developers who aren’t incorporating security practices. This book solves those issues by teaching you security first, going over software best practices as understood by security professionals, not developers. Then it teaches you how security is implemented in ASP.NET. With that foundation, it dives into specific security-related functionality and discusses how to improve upon the default functionality with working code samples. And you will learn how security professionals build software security programs so you can continue building software security best practices into your own Secure Software Development Life Cycle (SSDLC). What You’ll Learn Know how both attackers and professional defenders approach web security Establish a baseline of security for understanding how to design more secure software Discern which attacks are easy to prevent, and which are more challenging, in ASP.NET Dig into ASP.NET source code to understand how the security services work Know how the new logging system in ASP.NET falls short of security needs Incorporate security into your software development process Who This Book Is For Software developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET. To get the most out of this book, you should already have a basic understanding of web programming and ASP.NET, including creating new projects, creating pages, and using JavaScript. Topics That Are New to This Edition This edition has been updated with the following changes: Best practices and code samples updated to reflect security-related changes in ASP.NET 8 Improved examples, including a fully-functional website incorporating security suggestions Best practices for securely using Large Language Models (LLMs) and AI Expansions and clarifications throughout

Advanced Audio Visualization Using ThMAD: Creating Amazing Graphics with Open Source Software

by Peter Späth

Learn advanced techniques and improve your audio visualization skills with Thinking Machine Audio Dreams (ThMAD). With this book, you can concentrate on advanced examples and usage patterns, including using shaders in a more profound way, and how to incorporate ThMAD into a tool chain using the professional sound server JACK.

Advanced Backend Code Optimization

by Sid Touati Benoit Dupont de Dinechin

This book is a summary of more than a decade of research in the area of backend optimization. It contains the latest fundamental research results in this field. While existing books are often more oriented toward Masters students, this book is aimed more towards professors and researchers as it contains more advanced subjects.It is unique in the sense that it contains information that has not previously been covered by other books in the field, with chapters on phase ordering in optimizing compilation; register saturation in instruction level parallelism; code size reduction for software pipelining; memory hierarchy effects and instruction level parallelism.Other chapters provide the latest research results in well-known topics such as register need, and software pipelining and periodic register allocation.

Advanced Bioscience and Biosystems for Detection and Management of Diabetes (Springer Series on Bio- and Neurosystems #13)

by Kishor Kumar Sadasivuni John-John Cabibihan Abdulaziz Khalid A M Al-Ali Rayaz A. Malik

This book covers the medical condition of diabetic patients, their early symptoms and methods conventionally used for diagnosing and monitoring diabetes. It describes various techniques and technologies used for diabetes detection. The content is built upon moving from regressive technology (invasive) and adapting new-age pain-free technologies (non-invasive), machine learning and artificial intelligence for diabetes monitoring and management. This book details all the popular technologies used in the health care and medical fields for diabetic patients. An entire chapter is dedicated to how the future of this field will be shaping up and the challenges remaining to be conquered. Finally, it shows artificial intelligence and predictions, which can be beneficial for the early detection, dose monitoring and surveillance for patients suffering from diabetes

Advanced Biosignal Processing

by Amine Nait-Ali

Through 17 chapters, this book presents the principle of many advanced biosignal processing techniques. After an important chapter introducing the main biosignal properties as well as the most recent acquisition techniques, it highlights five specific parts which build the body of this book. Each part concerns one of the most intensively used biosignals in the clinical routine, namely the Electrocardiogram (ECG), the Elektroenzephalogram (EEG), the Electromyogram (EMG) and the Evoked Potential (EP). In addition, each part gathers a certain number of chapters related to analysis, detection, classification, source separation and feature extraction. These aspects are explored by means of various advanced signal processing approaches, namely wavelets, Empirical Modal Decomposition, Neural networks, Markov models, Metaheuristics as well as hybrid approaches including wavelet networks, and neuro-fuzzy networks. The last part, concerns the Multimodal Biosignal processing, in which we present two different chapters related to the biomedical compression and the data fusion. Instead organising the chapters by approaches, the present book has been voluntarily structured according to signal categories (ECG, EEG, EMG, EP). This helps the reader, interested in a specific field, to assimilate easily the techniques dedicated to a given class of biosignals. Furthermore, most of signals used for illustration purpose in this book can be downloaded from the Medical Database for the Evaluation of Image and Signal Processing Algorithm. These materials assist considerably the user in evaluating the performances of their developed algorithms. This book is suited for final year graduate students, engineers and researchers in biomedical engineering and practicing engineers in biomedical science and medical physics.

Advanced Blockchain Development: Build highly secure, decentralized applications and conduct secure transactions

by Imran Bashir Narayan Prusty

Explore distributed ledger technology, decentralization, and smart contracts and develop real-time decentralized applications with Ethereum and SolidityKey FeaturesGet to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsGain advanced insights into cryptography and cryptocurrenciesBook DescriptionBlockchain technology is a distributed ledger with applications in industries such as finance, government, and media. This Learning Path is your guide to building blockchain networks using Ethereum, JavaScript, and Solidity. You will get started by understanding the technical foundations of blockchain technology, including distributed systems, cryptography and how this digital ledger keeps data secure. Further into the chapters, you’ll gain insights into developing applications using Ethereum and Hyperledger. As you build on your knowledge of Ether security, mining , smart contracts, and Solidity, you’ll learn how to create robust and secure applications that run exactly as programmed without being affected by fraud, censorship, or third-party interference. Toward the concluding chapters, you’ll explore how blockchain solutions can be implemented in applications such as IoT apps, in addition to its use in currencies. The Learning Path will also highlight how you can increase blockchain scalability and even discusses the future scope of this fascinating and powerful technology. By the end of this Learning Path, you'll be equipped with the skills you need to tackle pain points encountered in the blockchain life cycle and confidently design and deploy decentralized applications.This Learning Path includes content from the following Packt products:Mastering Blockchain - Second Edition by Imran BashirBuilding Blockchain Projects by Narayan PrustyWhat you will learnUnderstand why decentralized applications are importantDiscover the mechanisms behind bitcoin and alternative cryptocurrenciesMaster how cryptography is used to secure data with the help of examplesMaintain, monitor, and manage your blockchain solutionsCreate Ethereum walletsExplore research topics and the future scope of blockchain technologyWho this book is forThis Learning Path is designed for blockchain developers who want to build decentralized applications and smart contracts from scratch using Hyperledger. Basic familiarity with any programming language will be useful to get started with this Learning Path.

Advanced Blockchain Technology: Frameworks and Enterprise-Level Practices

by Liang Cai Qilei Li Xiubo Liang

This book is a must-have for blockchain developers who want to learn from scratch how to leverage blockchain technology in a real-world setting. The first section provides a brief overview of blockchain technology, including its concepts, history, technology genre, major related companies and typical application scenarios, and presents an ecological map for the blockchain industry by comparing and analyzing some mainstream platforms.The second section systematically introduces Ethereum and HyperLedger, exemplars of well-known open-source blockchain platforms, and demonstrates how to conduct blockchain applications development based on the two platforms.The third section illustrates core technology of enterprise blockchain platforms (to take Hyperchain, an independent, controllable blockchain alliance as an example), and covers Hyperchain based enterprise blockchain applications development technology.The fourth section presents 6 actual blockchain-based applications examples, and analyzes applications development procedure and related key codes. Examples in this book are of great practicability and operability, allowing practitioners to get started easily, and eventually utilize these skills to develop real-life, usable blockchain applications.

Advanced Boolean Techniques: Selected Papers from the 13th International Workshop on Boolean Problems

by Rolf Drechsler Mathias Soeken

This book describes recent findings in the domain of Boolean logic and Boolean algebra, covering application domains in circuit and system design, but also basic research in mathematics and theoretical computer science. Content includes invited chapters and a selection of the best papers presented at the 13th annual International Workshop on Boolean Problems.Provides a single-source reference to the state-of-the-art research in the field of logic synthesis and Boolean techniques;Includes a selection of the best papers presented at the 13th annual International Workshop on Boolean Problems;Covers Boolean algebras, Boolean logic, Boolean modeling, Combinatorial Search, Boolean and bitwise arithmetic, Software and tools for the solution of Boolean problems, Applications of Boolean logic and algebras, Applications to real-world problems, Boolean constraint solving, and Extensions of Boolean logic.

Advanced Business Analytics

by Fausto Pedro García Márquez Benjamin Lev

The book describes advanced business analytics and shows how to apply them to many different professional areas of engineering and management. Each chapter of the book is contributed by a different author and covers a different area of business analytics. The book connects the analytic principles with business practice and provides an interface between the main disciplines of engineering/technology and the organizational, administrative and planning abilities of management. It also refers to other disciplines such as economy, finance, marketing, behavioral economics and risk analysis. This book is of special interest to engineers, economists and researchers who are developing new advances in engineering management but also to practitioners working on this subject.

Advanced C++: Master the technique of confidently writing robust C++ code

by Brian Price Vivek Nagarajan Gazihan Alankus Olena Lizina Rakesh Mane

Become an expert at C++ by learning all the key C++ concepts and working through interesting exercises Key Features Explore C++ concepts through descriptive graphics and interactive exercises Learn how to keep your development bug-free with testing and debugging Discover various techniques to optimize your code Book Description C++ is one of the most widely used programming languages and is applied in a variety of domains, right from gaming to graphical user interface (GUI) programming and even operating systems. If you're looking to expand your career opportunities, mastering the advanced features of C++ is key. The book begins with advanced C++ concepts by helping you decipher the sophisticated C++ type system and understand how various stages of compilation convert source code to object code. You'll then learn how to recognize the tools that need to be used in order to control the flow of execution, capture data, and pass data around. By creating small models, you'll even discover how to use advanced lambdas and captures and express common API design patterns in C++. As you cover later chapters, you'll explore ways to optimize your code by learning about memory alignment, cache access, and the time a program takes to run. The concluding chapter will help you to maximize performance by understanding modern CPU branch prediction and how to make your code cache-friendly. By the end of this book, you'll have developed programming skills that will set you apart from other C++ programmers. What you will learn Delve into the anatomy and workflow of C++ Study the pros and cons of different approaches to coding in C++ Test, run, and debug your programs Link object files as a dynamic library Use templates, SFINAE, constexpr if expressions and variadic templates Apply best practice to resource management Who this book is for If you have worked in C++ but want to learn how to make the most of this language, especially for large projects, this book is for you. A general understanding of programming and knowledge of using an editor to produce code files in project directories is a must. Some experience with strongly typed languages, such as C and C++, is also recommended.

Refine Search

Showing 876 through 900 of 56,825 results