Résultats de recherche de titre
Articles 1 à 20 sur 2744
Charles iii: New king. new court. the inside story
Par Robert Hardman. 2024
Read by the author, Robert Hardman. 'A superb, fascinating account of the new King, his court and the first year…
of his reign. Elegantly written by the most authoritative of royal historians writing today, it is deeply researched, impeccably sourced and filled with scoops and new details. This is the definitive book' – Simon Sebag Montefiore, author of The Romanovs By acclaimed royal biographer and author of Queen of Our Times, Robert Hardman, Charles III is a brilliant account of a tumultuous period in British history, full of intriguing insider detail and the real stories behind the sadness, the dazzling pomp, the challenges and the triumphs as Charles III sets out to make his mark. How would – or could – he fill the shoes of the record-breaking Elizabeth II? With fresh debates about the monarchy, political upheavals and a steady flow of damning headlines unleashed by the Duke and Duchess of Sussex, Charles could not afford to put a foot wrong. Hardman draws on unrivalled access to the Royal Family, friends of the King and Queen, key officials and courtiers, plus unpublished royal papers, to chart the transition from those emotionally charged days following the death of the late Queen all through that make or break first year on the throne. This book also reveals how Charles III is determined to move ahead at speed, the vital role played by Queen Camilla, the King's relationships with his sons and the rest of his family, his plans for reforming the monarchy and how he is taking his place on the world stage. Charles III is a fascinating portrait of a hard-working, modern monarch, determined to remain true to himself and to his Queen, to make a difference, to weather the storms – and, what's more, to enjoy it. 'Hardman is the unsurpassed grand master when it comes to the inside story of the modern monarchy. Full of surprises and glorious detail' – Andrew Roberts, author of George III: The Life and Reign of Britain's Most Misunderstood MonarchDieu, la science, les preuves: l'aube d'une révolution
Par Michel-Yves Bolloré. 2021
S'appuyant sur un travail de trois années en collaboration avec une vingtaine de scientifiques et de spécialistes, les auteurs présentent…
les preuves modernes de l'existence de Dieu. A partir de 1543 et durant trois siècles, des découvertes scientifiques ont remis en cause l'idée d'un dieu créateur. Depuis le début du XXe siècle, de nouvelles connaissances bouleversent à nouveau les certitudesBuilding a cyber risk management program: Evolving security for the digital age
Par Brian Allen. 2024
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseHacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun…
reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. This book will help you understand the relationship between hacker culture and cybersecurity; get to know the ideas behind the hacker ethos, like "knowledge should be free"; explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow; appreciate the history of cybersecurity; learn about key figures in the history of hacker culture; and understand the difference between hackers and cybercriminalsBlockchain-based Internet of Things: Opportunities, Challenges and Solutions
Par Iraq Ahmad Reshi, Sahil Sholla. 2024
This book presents an overview of the blockchain-based Internet of Things systems, along with the opportunities, challenges, and solutions in…
diverse fields such as business, education, agriculture, and healthcare. It discusses scalability, security, layers, threats, and countermeasures in blockchain-based Internet of Things network.· Elaborates on the opportunities presented by combining blockchain with artificial intelligence on the Internet of Things systems in the management of food systems, and drug supply chains.· Explains the management of computationally intensive tasks in blockchain-based Internet of Things through the development of lightweight protocols.· Presents various applications in fields including logistics and the supply chain, automobile industry, smart housing, shared economy, and agriculture.· Provides insights into blockchain-based Internet of Things systems, along with their features, vulnerabilities, and architectural flaws.· The text is primarily written for graduate students, and academic researchers working in the fields of computer science and engineering, electrical engineering, and information technology.This book unveils the most advanced techniques and innovative applications in the natural language processing (NLP) field. It uncovers the…
secrets to enhancing language understanding, and presents practical solutions to different NLP tasks, as text augmentation, paraphrase generation, and restoring spaces and punctuation in multiple languages. It unlocks the potential of hierarchical multi-task learning for cross-lingual phoneme recognition, and allows readers to explore more real-world applications such as error correction, aggregating industrial security findings as well as predicting music emotion values from social media conversations. "Practical Solutions for Diverse Real-World NLP Applications" is the suitable guidebook for researchers, students, and practitioners as it paves the way for them by delivering invaluable insights and knowledge.Computer Science and Educational Informatization: 5th International Conference, CSEI 2023, Kunming, China, August 11–13, 2023, Revised Selected Papers, Part II (Communications in Computer and Information Science #1900)
Par Jianhou Gan, Yi Pan, Juxiang Zhou, Dong Liu, Xianhua Song, Zeguang Lu. 2024
These two volumes constitute the revised selected papers of the 5th International Conference, CSEI 2023, held in Kunming, China, during…
August 11–13, 2023.The 76 full papers and the 21 short papers included in this volume were carefully reviewed and selected from 297 submissions. They focus on computer science, education informatization and engineering education, innovative application for the deeper integration of education practice and information technology, educational informatization and big data for education.Optimising NMR Spectroscopy Through Method and Software Development (Springer Theses)
Par Jonathan Yong. 2024
This book provides a comprehensive overview of Nuclear Magnetic Resonance (NMR) theory, its applications, and advanced techniques to improve the…
quality and speed of NMR data acquisition. In this book, the author expands his outstanding Ph.D. thesis and provides a valuable resource for researchers, professionals, and students in the field of NMR spectroscopy. The book covers quantum mechanics basics, and topics like density operators, pulse sequences, 1D pulse acquisition, INEPT (Insensitive nuclei enhancement by polarization transfer), product operators, and 2D NMR principles. It also explores innovative experiments like States HSQC (Heteronuclear Single Quantum Coherence) and echo-antiecho HSQC with gradients. In the subsequent chapters, the author discusses Pure Shift NMR, including PSYCHE (Pure Shift Yielded by Chirp Excitation) and its optimizations, such as waveform parameterization and time-reversal methods. The 'Discrete PSYCHE' approach and Ultrafast PSYCHE-iDOSY (Diffusion-ordered spectroscopy) are also highlighted. This book presents the POISE (Parameter Optimisation by Iterative Spectral Evaluation) software for real-time NMR experiment optimization, including pulse width calibration and Ernst angle optimization, and demonstrates applications across various NMR experiments. Lastly, the book examines accelerated 2D NMR data collection and the NOAH (NMR by Ordered Acquisition using 1H detection) supersequences, emphasizing automated pulse program creation using GENESIS (GENEration of Supersequences In Silico). Covered NMR experiments include 13C sensitivity-enhanced HSQC, 15N HMQC (Heteronuclear Multiple Quantum Coherence), dual HSQC, HSQC-TOCSY (Total Correlation Spectroscopy), HMBC (Heteronuclear Multiple Bond Correlation), and ADEQUATE (Adequate Sensitivity Double-Quantum Spectroscopy).Information and Software Technologies: 29th International Conference, ICIST 2023, Kaunas, Lithuania, October 12–14, 2023, Proceedings (Communications in Computer and Information Science #1979)
Par Audrius Lopata, Daina Gudonienė, Rita Butkienė. 2024
This book constitutes the refereed proceedings of the 29th International Conference on Information and Software Technologies, ICIST 2023, held in…
Kaunas, Lithuania, in October 2023.The 27 full papers included in this volume were carefully reviewed and selected from 75 submissions. These proceedings contain a diverse array of research and insights in the field of Information Technology and related areas, such as: intelligent systems and software engineering advances, intelligent methods for data analysis and computer aided software engineering, language technologies and smart e-learning applications, AI-based it solutions.Continuous Biometric Authentication Systems: An Overview (SpringerBriefs in Computer Science)
Par Max Smith-Creasey. 2024
This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from…
user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges.This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable to devices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches.This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security.Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks (Advances in Computer Vision and Pattern Recognition)
Par Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez, Christoph Busch. 2022
This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes,…
Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the topic, which address readers wishing to gain a brief overview of the state-of-the-art. Subsequent chapters, which delve deeper into various research challenges, are oriented towards advanced readers. Moreover, the book provides a good starting point for young researchers as well as a reference guide pointing at further literature. Hence, the primary readership is academic institutions and industry currently involved in digital face manipulation and detection. The book could easily be used as a recommended text for courses in image processing, machine learning, media forensics, biometrics, and the general security area.Technologieinduzierte Entwicklung neuer Wertversprechen im Software-intensive Business
Par Felix Schönhofen. 2023
Die Digitalisierung der meisten Branchen spiegelt sich in einem wachsenden Anteil der Software an der Gesamtwertschöpfung wider. Unternehmen eröffnen sich…
dadurch neue Möglichkeiten für technologische Innovationen. Gleichzeitig stehen sie aber vor der ständigen Herausforderung, diese Innovationen in Produkte zu überführen, die für den Kunden wertstiftend sind. Dieser Problemstellung widmeten sich bereits eine Reihe an Methoden zur Produkt- und Geschäftsmodellinnovation, die Überführung der hier gewonnenen Erkenntnisse in die konkrete Produktgestaltung bleibt jedoch eine Herausforderung.Genau hier setzt diese Arbeit an, indem sie die methodische Vorgehensweise „Value Proposition Deployment“ vorschlägt, mit der Unternehmen auf Basis technologischer Innovationen neue Wertversprechen entwickeln können. Hierzu verbindet das Value Proposition Deployment Erkenntnisse des Innovationsmanagements mit Methoden der konstruktiven Qualitätssicherung und stellt somit eine Brücke zwischen Innovations- und Qualitätsmanagement dar. Die auf Basis von 15 praxisrelevanten Gestaltungsanforderungen entwickelte Methode wird detailliert erläutert und anhand praxisnaher Fallbeispiele beschrieben.Formal Methods for Industrial Critical Systems: 25th International Conference, FMICS 2020, Vienna, Austria, September 2–3, 2020, Proceedings (Lecture Notes in Computer Science #12327)
Par Maurice H. ter Beek, Dejan Ničković. 2020
This book constitutes the proceedings of the 25th International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2020, which…
was held during September 2-3, 2020. The conference was planned to take place in Vienna, Austria. Due to the COVID-19 pandemic it changed to a virtual event.The 11 full papers presented in this volume were carefully reviewed and selected from 26 submissions. The papers are organized in topical sections as follows: Quantitative Analysis and Cyber-Physical Systems, Formal Verification of Industrial Systems, Temporal Logic and Model Checking. The book also contains a lengthy report on a Formal Methods Survey conducted on occasion of the 25th edition of the conference.Computer Security. ESORICS 2022 International Workshops: CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers (Lecture Notes in Comput
Par Sokratis Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla. 2023
This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium…
on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022. The 39 papers included in these proceedings stem from the following workshops: 8th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2022, which accepted 8 papers from 15 submissions; 6th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2022, which accepted 2 papers from 5 submissions; Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2022, which accepted 4 full papers out of 13 submissions; Third Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2022, which accepted 9 full and 1 short paper out of 19 submissions; Second International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2022, which accepted 5 papers out of 8 submissions; First International Workshop on Election Infrastructure Security, EIS 2022, which accepted 5 papers out of 10 submissions; and First International Workshop on System Security Assurance, SecAssure 2022, which accepted 5 papers out of 10 submissions.Segmentation of the Aorta. Towards the Automatic Segmentation, Modeling, and Meshing of the Aortic Vessel Tree from Multicenter Acquisition: First Challenge, SEG.A. 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 8, 2023, Procee
Par Antonio Pepe, Gian Marco Melito, Jan Egger. 2024
This book constitutes the First Segmentation of the Aorta Challenge, SEG.A. 2023, which was held in conjunction with the 26th…
International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2023, on October 8, 2023. The 8 full and 3 short papers presented have been carefully reviewed and selected for inclusion in the book. They focus specifically on robustness, visual quality and meshing of automatically generated segmentations of aortic vessel trees from CT imaging. The challenge was organized as a ”container submission” challenge, where participants had to upload their algorithms to Grand Challenge in the form of Docker containers. Three tasks were created for SEG.A. 2023.This book constitutes revised papers from the International Workshops held at the 21st International Conference on Business Process Management, BPM…
2023, in Utrecht, The Netherlands, during September 2023.Papers from the following workshops are included:• 7th International Workshop on Artificial Intelligence for Business Process Management (AI4BPM 2023)• 7th International Workshop on Business Processes Meet Internet-of-Things (BP-Meet-IoT 2023)• 19th International Workshop on Business Process Intelligence (BPI 2023)• 16th International Workshop on Social and Human Aspects of Business Process Management (BPMS2 2023)• 2nd International Workshop on Data-Driven Business Process Optimization (BPO 2023)• 11th International Workshop on Declarative, Decision and Hybrid Approaches to Processes (DEC2H 2023)• 1st International Workshop on Digital Twins for Business Processes (DT4BP 2023)• 1st International Workshop on Formal Methods for Business Process Management (FM-BPM 2023) • 2nd International Workshop on Natural Language Processing for Business Process Management (NLP4BPM 2023)• 1st International Workshop on Object-Centric Processes from A to Z (OBJECTS 2023)• 3rd International Workshop on Change, Drift, and Dynamics of Organizational Processes (ProDy 2023) Each of the workshops focused on particular aspects of business process management. Overall, after a thorough review process, 42 full papers were selected from a total of 86 submissions.Transactions on Intelligent Welding Manufacturing: Volume V No. 1 2021 (Transactions on Intelligent Welding Manufacturing)
Par Shanben Chen, Yuming Zhang, Zhili Feng. 2024
The primary aim of this book is to provide researchers and engineers from both academic and industry with up-to-date coverage…
of new results in the field of robotic welding, intelligent systems and automation. The book is mainly based on papers selected from the 2022 International Conference on Robotic Welding, Intelligence and Automation (RWIA’2022) in Shanghai and Lanzhou, China. The articles show that the intelligentized welding manufacturing (IWM) is becoming an inevitable trend with the intelligentized robotic welding as the key technology. The volume is divided into four logical parts: Intelligent Techniques for Robotic Welding, Sensing of Arc Welding Processing, Modeling and Intelligent Control of Welding Processing, as well as Intelligent Control and its Applications in Engineering.Edge Intelligent Computing Systems in Different Domains (SpringerBriefs in Computer Science)
Par Benedetta Picano, Romano Fantacci. 2024
This book provides a comprehensive and systematic exploration of next-generation Edge Intelligence (EI) Networks. It delves deep into the critical…
design considerations within this context, emphasizing the necessity for functional and dependable interactions between networking strategies and the diverse application scenarios. This should help assist to encompass a wide range of environments.This book also discusses topics such as resource optimization, incentive mechanisms, channel prediction and cutting-edge technologies, which includes digital twins and advanced machine learning techniques. It underscores the importance of functional integration to facilitate meaningful collaborations between networks and systems, while operating across heterogeneous environments aiming support novel and disruptive human-oriented services and applications. Valuable insights into the stringent requirements for intelligence capabilities, communication latency and real-time response are discussed. This characterizes the new EI era, driving the creation of comprehensive cross-domain architectural ecosystems that infuse human-like intelligence into every aspect of emerging EI systems.This book primarily targets advanced-level students as well as postdoctoral researchers, who are new to this field and are searching for a comprehensive understanding of emerging EI systems. Practitioners seeking guidance in the development and implementation of EI systems in practical contexts will also benefit from this book.Development and Testing of Vehicle Software and its Influence on Sustainable Transport
Par Antonio Colmenar-Santos, David Borge-Diez, Pedro-Miguel Ortega-Cabezas. 2024
This book evaluates the contributions of the electronic control unit software of an electric vehicle on sustainability and society, such…
as the reduction of emissions during a product design and the improvements in the vehicle. A sustainable transport model is proposed, demonstrating its economic viability. By validating software in a more efficient way and adding new functionalities to the software to enhance driving efficiency, energy consumption can be significantly reduced. Therefore, software validation and development have a significant impact on sustainability. This book offers innovative validation solutions based on artificial intelligence techniques to reduce validation time and emissions. The impact of driving efficiency on sustainable transport models is studied in detail, making proposals to be considered in the current environmental policies under discussion within the European Union in order to improve the sustainability of transport models. Vehicles are becoming sophisticated electronic systems due to the fact that they are integrating a significant number of electronic control units. This trend will certainly continue in the year to come. Consequently, software validation techniques are a key element for car manufacturers in order to ensure the quality of the vehicle. This book contributes to these efforts.Statistics and Data Analysis for Engineers and Scientists (Transactions on Computer Systems and Networks)
Par Tanvir Mustafy, Md. Tauhid Rahman. 2024
This textbook summarizes the different statistical, scientific, and financial data analysis methods for users ranging from a high school level…
to a professional level. It aims to combine the data analysis methods using three different programs—Microsoft Excel, SPSS, and MATLAB. The book combining the different data analysis tools is a unique approach. The book presents a variety of real-life problems in data analysis and machine learning, delivering the best solution. Analysis methods presented in this book include but are not limited to, performing various algebraic and trigonometric operations, regression modeling, and correlation, as well as plotting graphs and charts to represent the results. Fundamental concepts of applied statistics are also explained here, with illustrative examples. Thus, this book presents a pioneering solution to help a wide range of students, researchers, and professionals learn data processing, interpret different findings derived from the analyses, and apply them to their research or professional fields. The book also includes worked examples of practical problems. The primary focus behind designing these examples is understanding the concepts of data analysis and how it can solve problems. The chapters include practice exercises to assist users in enhancing their skills to execute statistical analysis calculations using software instead of relying on tables for probabilities and percentiles in the present world.