Résultats de recherche de titre
Articles 1 à 20 sur 2587
The Engineering Executive's Primer
Par Will Larson. 2024
As an engineering manager, you almost always have someone in your company to turn to for advice: a peer on…
another team, your manager, or even the head of engineering. But who do you turn to if you're the head of engineering? Engineering executives have a challenging learning curve, and many folks excitedly start their first executive role only to leave frustrated within the first 18 months.In this book, author Will Larson shows you ways to obtain your first executive job and quickly ramp up to meet the challenges you may not have encountered in non-executive roles: measuring engineering for both engineers and the CEO, company-scoped headcount planning, communicating successfully across a growing organization, and figuring out what people actually mean when they keep asking for a "technology strategy."This book explains how to:Get an engineering executive job, negotiate the contract, and onboard at your new companyRun an engineering planning process and communicate effectively with the organizationDirect the core meetings necessary to operate an effective engineering organizationHire, onboard, and run performance managementManage yourself and remain effective through many challengesLeave the job when the time is rightWill Larson was the chief technology officer at Calm and the author of An Elegant Puzzle and Staff Engineer. He's also a prolific writer on his blog, Irrational Exuberance.Advances in Aerial Sensing and Imaging
Par Sandeep Kumar, Nageswara Rao Moparthi, Abhishek Bhola, Ravinder Kaur, A. Senthil, K.M.V.V. Prasad. 2024
Advances in Aerial Sensing and Imaging This groundbreaking book is a comprehensive guide to the technology found in the complex…
field of aerial sensing and imaging, and the real-world challenges that stem from its growing significance and demand. The advent of unmanned aerial vehicles (UAVs), or drones, along with advancements in sensor technology and image processing techniques, has further enhanced the capabilities and applications of aerial sensing and imaging. These developments have opened up new research, innovation, and exploration avenues. Aerial sensing and imaging have rapidly evolved over the past few decades and have revolutionized several fields, including land cover and usage prediction, crop and livestock management, road accident monitoring, poverty estimation, defense, agriculture, forest fire detection, UAV security issues, and open parking management. This book provides a comprehensive understanding and knowledge of the underlying technology and its practical applications in different domains. Audience Computer science and artificial intelligence researchers working in the fields of aerial sensing and imaging, as well as professionals working in industries such as agriculture, geology, surveying, urban planning, disaster response, etc; this book provides them with practical guidance and instruction on how to apply aerial sensing and imaging for various purposes and stay up-to-date with the latest developments in the domain.Optimized Predictive Models in Health Care Using Machine Learning
Par Sandeep Kumar, Anuj Sharma, Navneet Kaur, Lokesh Pawar, Rohit Bajaj. 2024
OPTIMIZED PREDICTIVE MODELS IN HEALTH CARE USING MACHINE LEARNING This book is a comprehensive guide to developing and implementing optimized…
predictive models in healthcare using machine learning and is a required resource for researchers, healthcare professionals, and students who wish to know more about real-time applications. The book focuses on how humans and computers interact to ever-increasing levels of complexity and simplicity and provides content on the theory of optimized predictive model design, evaluation, and user diversity. Predictive modeling, a field of machine learning, has emerged as a powerful tool in healthcare for identifying high-risk patients, predicting disease progression, and optimizing treatment plans. By leveraging data from various sources, predictive models can help healthcare providers make informed decisions, resulting in better patient outcomes and reduced costs. Other essential features of the book include: provides detailed guidance on data collection and preprocessing, emphasizing the importance of collecting accurate and reliable data; explains how to transform raw data into meaningful features that can be used to improve the accuracy of predictive models; gives a detailed overview of machine learning algorithms for predictive modeling in healthcare, discussing the pros and cons of different algorithms and how to choose the best one for a specific application; emphasizes validating and evaluating predictive models; provides a comprehensive overview of validation and evaluation techniques and how to evaluate the performance of predictive models using a range of metrics; discusses the challenges and limitations of predictive modeling in healthcare; highlights the ethical and legal considerations that must be considered when developing predictive models and the potential biases that can arise in those models. Audience The book will be read by a wide range of professionals who are involved in healthcare, data science, and machine learning.Lifelong and Continual Learning Dialogue Systems (Synthesis Lectures on Human Language Technologies)
Par Sahisnu Mazumder, Bing Liu. 2024
This book introduces the new paradigm of lifelong and continual learning dialogue systems to endow dialogue systems with the ability…
to learn continually by themselves through their own self-initiated interactions with their users and the working environments. The authors present the latest developments and techniques for building such continual learning dialogue systems. The book explains how these developments allow systems to continuously learn new language expressions, lexical and factual knowledge, and conversational skills through interactions and dialogues. Additionally, the book covers techniques to acquire new training examples for learning new tasks during the conversation. The book also reviews existing work on lifelong learning and discusses areas for future research.This book gathers the proceedings of the 8th International Conference on Advancements of Medicine and Health Care through Technology, MEDITECH…
2022, held virtually on 20–22 October 2022, from Cluj-Napoca, Romania. It reports on both theoretical and practical developments in biomedical imaging and image processing, health technology, technologies for education, and biomedical signal processing and medical devices, measurements and instrumentation. Both the conference and the realization of this book were supported by the Romanian National Society for Medical Engineering and Biological Technology (SNIMTB).The 2x2 Matrix: Contingency, Confusion and the Metrics of Binary Classification
Par A. J. Larner. 2024
This book describes, extends, and illustrates the metrics of binary classification through worked examples.Worked examples based on pragmatic test accuracy…
study data are used in chapters to illustrate relevance to day-to-day clinical practice. Readers will gain an understanding of sensitivity and specificity and predictive values along with many other parameters.The contents are highly structured, and the use of worked examples facilitates understanding and interpretation.This book is a resource for clinicians in any discipline who are involved in the performance or assessment of test accuracy studies and professionals in the disciplines of machine learning or informatics wishing to gain insight into clinical applications of 2x2 tables.Cambridge International AS Level Information Technology Student's Book Second Edition
Par Graham Brown, Brian Sargent. 2024
Our AS Level student book is endorsed by Cambridge International Education to support the full syllabus for examination from 2025.Develop…
theoretical and practical IT skills with this comprehensive Student's Book written by experienced authors and examiners specially for the updated Cambridge International Education AS Level Information Technology syllabus (9626).- Improve understanding of concepts and terminology with clear explanations, labelled illustrations, photographs, diagrams, plus a glossary of key terms- Develop theoretical and practical skills with a range of exercises (multi choice through to discussion type questions), exam-style questions, step-by-step instructions and example answers that all ensure skills are developed alongside knowledge- Follow a structured route through the course with in-depth coverage of the full syllabusAlso available in the series:Cambridge International AS Level Information Technology Student Book eBook 9781036005597Cambridge International AS Level Information Technology Skills Workbook 9781510483064Blockchain and Machine Learning for IoT Security
Par Mourade Azrour, Jamal Mabrouki, Azidine Guezzaz, and Said Benkirane. 2024
The Internet of Things (IoT) involves physical devices, cars, household appliances, and any other physical appliance equipped with sensors, software,…
and network connections to gather and communicate data. Nowadays, this technology is embedded in everything from simple smart devices, to wearable equipment, to complex industrial machinery and transportation infrastructures. On the other hand, IoT equipment has been designed without considering security issues. Consequently, there are many challenges in terms of protection against IoT threats, which can lead to distressing situations. In fact, unlike other technological solutions, there are few standards and guidelines governing the protection of IoT technology. Moreover, few users are aware of the risks associated with IoT systems. Hence, Blockchain and Machine Learning for IoT Security discusses various recent techniques and solutions related to IoT deployment, especially security and privacy. This book addresses a variety of subjects, including a comprehensive overview of the IoT, and covers in detail the security challenges at each layer by considering how both the architecture and underlying technologies are employed. As acknowledged experts in the field, the authors provide remediation solutions for impaired security, as well as mitigation methods, and offer both prevention and improvement suggestions. Key Features: Offers a unique perspective on IoT security by introducing Machine Learning and Blockchain solutions Presents a well-rounded overview of the most recent advances in IoT security and privacy Discusses practical solutions and real-world cases for IoT solutions in various areas Provides solutions for securing IoT against various threats Discuses Blockchain technology as a solution for IoT This book is designed to provide all the necessary knowledge for young researchers, academics, and industry professionals who want to understand the advantages of artificial intelligence technology, machine learning, data analysis methodology, and Blockchain for securing IoT technologies.Long Life Strategy: A Guide for Living a Longer, Healthier, and More Fulfilling life
Par Ronald M. Caplan. 2023
The second edition of Long Life Strategy builds upon the practical tips and knowledge in the first edition by providing readers…
with an outline to living a longer, healthier, more enjoyable life and late life. The book elaborates on three major areas, which include what you can do to live a long life, what your doctor should be doing to help you achieve this goal, and what society, of which we are all part, should be doing to better accommodate a growing number of older people in the coming decades. Dr. Caplan begins by introducing what it means to live a longer life and explaining the current research on delaying, preventing, and reversing aging in our cells. The next chapters detail how to prevent diseases and conditions commonly associated with aging, including diabetes, cancer, osteoporosis, mental health decline, sexual dysfunction, and heart disease. The author provides instruction for good diet and exercise choices. The concluding chapters provide useful advice for managing a fixed income, becoming a grandparent, dealing with the sickness and loss of a life partner, and how to maintain social relationships into late life. No matter where you are on life’s journey, Long Life Strategy can provide a roadmap to living a longer, healthier, and more fulfilling life.Blockchain-based Internet of Things: Opportunities, Challenges and Solutions
Par Iraq Ahmad Reshi, Sahil Sholla. 2024
This book presents an overview of the blockchain-based Internet of Things systems, along with the opportunities, challenges, and solutions in…
diverse fields such as business, education, agriculture, and healthcare. It discusses scalability, security, layers, threats, and countermeasures in blockchain-based Internet of Things network.· Elaborates on the opportunities presented by combining blockchain with artificial intelligence on the Internet of Things systems in the management of food systems, and drug supply chains.· Explains the management of computationally intensive tasks in blockchain-based Internet of Things through the development of lightweight protocols.· Presents various applications in fields including logistics and the supply chain, automobile industry, smart housing, shared economy, and agriculture.· Provides insights into blockchain-based Internet of Things systems, along with their features, vulnerabilities, and architectural flaws.· The text is primarily written for graduate students, and academic researchers working in the fields of computer science and engineering, electrical engineering, and information technology.This book unveils the most advanced techniques and innovative applications in the natural language processing (NLP) field. It uncovers the…
secrets to enhancing language understanding, and presents practical solutions to different NLP tasks, as text augmentation, paraphrase generation, and restoring spaces and punctuation in multiple languages. It unlocks the potential of hierarchical multi-task learning for cross-lingual phoneme recognition, and allows readers to explore more real-world applications such as error correction, aggregating industrial security findings as well as predicting music emotion values from social media conversations. "Practical Solutions for Diverse Real-World NLP Applications" is the suitable guidebook for researchers, students, and practitioners as it paves the way for them by delivering invaluable insights and knowledge.Computer Science and Educational Informatization: 5th International Conference, CSEI 2023, Kunming, China, August 11–13, 2023, Revised Selected Papers, Part II (Communications in Computer and Information Science #1900)
Par Jianhou Gan, Yi Pan, Juxiang Zhou, Dong Liu, Xianhua Song, Zeguang Lu. 2024
These two volumes constitute the revised selected papers of the 5th International Conference, CSEI 2023, held in Kunming, China, during…
August 11–13, 2023.The 76 full papers and the 21 short papers included in this volume were carefully reviewed and selected from 297 submissions. They focus on computer science, education informatization and engineering education, innovative application for the deeper integration of education practice and information technology, educational informatization and big data for education.Optimising NMR Spectroscopy Through Method and Software Development (Springer Theses)
Par Jonathan Yong. 2024
This book provides a comprehensive overview of Nuclear Magnetic Resonance (NMR) theory, its applications, and advanced techniques to improve the…
quality and speed of NMR data acquisition. In this book, the author expands his outstanding Ph.D. thesis and provides a valuable resource for researchers, professionals, and students in the field of NMR spectroscopy. The book covers quantum mechanics basics, and topics like density operators, pulse sequences, 1D pulse acquisition, INEPT (Insensitive nuclei enhancement by polarization transfer), product operators, and 2D NMR principles. It also explores innovative experiments like States HSQC (Heteronuclear Single Quantum Coherence) and echo-antiecho HSQC with gradients. In the subsequent chapters, the author discusses Pure Shift NMR, including PSYCHE (Pure Shift Yielded by Chirp Excitation) and its optimizations, such as waveform parameterization and time-reversal methods. The 'Discrete PSYCHE' approach and Ultrafast PSYCHE-iDOSY (Diffusion-ordered spectroscopy) are also highlighted. This book presents the POISE (Parameter Optimisation by Iterative Spectral Evaluation) software for real-time NMR experiment optimization, including pulse width calibration and Ernst angle optimization, and demonstrates applications across various NMR experiments. Lastly, the book examines accelerated 2D NMR data collection and the NOAH (NMR by Ordered Acquisition using 1H detection) supersequences, emphasizing automated pulse program creation using GENESIS (GENEration of Supersequences In Silico). Covered NMR experiments include 13C sensitivity-enhanced HSQC, 15N HMQC (Heteronuclear Multiple Quantum Coherence), dual HSQC, HSQC-TOCSY (Total Correlation Spectroscopy), HMBC (Heteronuclear Multiple Bond Correlation), and ADEQUATE (Adequate Sensitivity Double-Quantum Spectroscopy).Information and Software Technologies: 29th International Conference, ICIST 2023, Kaunas, Lithuania, October 12–14, 2023, Proceedings (Communications in Computer and Information Science #1979)
Par Audrius Lopata, Daina Gudonienė, Rita Butkienė. 2024
This book constitutes the refereed proceedings of the 29th International Conference on Information and Software Technologies, ICIST 2023, held in…
Kaunas, Lithuania, in October 2023.The 27 full papers included in this volume were carefully reviewed and selected from 75 submissions. These proceedings contain a diverse array of research and insights in the field of Information Technology and related areas, such as: intelligent systems and software engineering advances, intelligent methods for data analysis and computer aided software engineering, language technologies and smart e-learning applications, AI-based it solutions.Continuous Biometric Authentication Systems: An Overview (SpringerBriefs in Computer Science)
Par Max Smith-Creasey. 2024
This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from…
user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges.This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable to devices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches.This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security.Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks (Advances in Computer Vision and Pattern Recognition)
Par Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez, Christoph Busch. 2022
This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes,…
Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the topic, which address readers wishing to gain a brief overview of the state-of-the-art. Subsequent chapters, which delve deeper into various research challenges, are oriented towards advanced readers. Moreover, the book provides a good starting point for young researchers as well as a reference guide pointing at further literature. Hence, the primary readership is academic institutions and industry currently involved in digital face manipulation and detection. The book could easily be used as a recommended text for courses in image processing, machine learning, media forensics, biometrics, and the general security area.Technologieinduzierte Entwicklung neuer Wertversprechen im Software-intensive Business
Par Felix Schönhofen. 2023
Die Digitalisierung der meisten Branchen spiegelt sich in einem wachsenden Anteil der Software an der Gesamtwertschöpfung wider. Unternehmen eröffnen sich…
dadurch neue Möglichkeiten für technologische Innovationen. Gleichzeitig stehen sie aber vor der ständigen Herausforderung, diese Innovationen in Produkte zu überführen, die für den Kunden wertstiftend sind. Dieser Problemstellung widmeten sich bereits eine Reihe an Methoden zur Produkt- und Geschäftsmodellinnovation, die Überführung der hier gewonnenen Erkenntnisse in die konkrete Produktgestaltung bleibt jedoch eine Herausforderung.Genau hier setzt diese Arbeit an, indem sie die methodische Vorgehensweise „Value Proposition Deployment“ vorschlägt, mit der Unternehmen auf Basis technologischer Innovationen neue Wertversprechen entwickeln können. Hierzu verbindet das Value Proposition Deployment Erkenntnisse des Innovationsmanagements mit Methoden der konstruktiven Qualitätssicherung und stellt somit eine Brücke zwischen Innovations- und Qualitätsmanagement dar. Die auf Basis von 15 praxisrelevanten Gestaltungsanforderungen entwickelte Methode wird detailliert erläutert und anhand praxisnaher Fallbeispiele beschrieben.Formal Methods for Industrial Critical Systems: 25th International Conference, FMICS 2020, Vienna, Austria, September 2–3, 2020, Proceedings (Lecture Notes in Computer Science #12327)
Par Maurice H. ter Beek, Dejan Ničković. 2020
This book constitutes the proceedings of the 25th International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2020, which…
was held during September 2-3, 2020. The conference was planned to take place in Vienna, Austria. Due to the COVID-19 pandemic it changed to a virtual event.The 11 full papers presented in this volume were carefully reviewed and selected from 26 submissions. The papers are organized in topical sections as follows: Quantitative Analysis and Cyber-Physical Systems, Formal Verification of Industrial Systems, Temporal Logic and Model Checking. The book also contains a lengthy report on a Formal Methods Survey conducted on occasion of the 25th edition of the conference.Computer Security. ESORICS 2022 International Workshops: CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers (Lecture Notes in Comput
Par Sokratis Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla. 2023
This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium…
on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022. The 39 papers included in these proceedings stem from the following workshops: 8th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2022, which accepted 8 papers from 15 submissions; 6th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2022, which accepted 2 papers from 5 submissions; Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2022, which accepted 4 full papers out of 13 submissions; Third Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2022, which accepted 9 full and 1 short paper out of 19 submissions; Second International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2022, which accepted 5 papers out of 8 submissions; First International Workshop on Election Infrastructure Security, EIS 2022, which accepted 5 papers out of 10 submissions; and First International Workshop on System Security Assurance, SecAssure 2022, which accepted 5 papers out of 10 submissions.Segmentation of the Aorta. Towards the Automatic Segmentation, Modeling, and Meshing of the Aortic Vessel Tree from Multicenter Acquisition: First Challenge, SEG.A. 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 8, 2023, Procee
Par Antonio Pepe, Gian Marco Melito, Jan Egger. 2024
This book constitutes the First Segmentation of the Aorta Challenge, SEG.A. 2023, which was held in conjunction with the 26th…
International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2023, on October 8, 2023. The 8 full and 3 short papers presented have been carefully reviewed and selected for inclusion in the book. They focus specifically on robustness, visual quality and meshing of automatically generated segmentations of aortic vessel trees from CT imaging. The challenge was organized as a ”container submission” challenge, where participants had to upload their algorithms to Grand Challenge in the form of Docker containers. Three tasks were created for SEG.A. 2023.