This monograph focuses on the design of personalized and adaptive online interactive learning environment (OILE) to enhance students' learning in and about complex dynamic systems (CDS).
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures.
Artificial intelligent systems, which offer great improvement in healthcare sector assisted by machine learning, wireless communications, data analytics, cognitive computing, and mobile computing provide more intelligent and convenient solutions and services.
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain.
Die Autorin stellt in diesem Standardwerk die zur Umsetzung der Sicherheitsanforderungen benötigten Verfahren und Protokolle detailliert vor und erläutert sie anschaulich anhand von Fallbeispielen.
The book addresses the impact of ambient intelligence, particularly its user-centric context-awareness requirement on data management strategies and solutions.
Embark on a comprehensive journey into the intricate world of IT infrastructure, with an in-depth look into the transformational role of secure, private data centers in today's digital era.
The book addresses the impact of ambient intelligence, particularly its user-centric context-awareness requirement on data management strategies and solutions.
Die Autorin stellt in diesem Standardwerk die zur Umsetzung der Sicherheitsanforderungen benötigten Verfahren und Protokolle detailliert vor und erläutert sie anschaulich anhand von Fallbeispielen.
Noch vor wenigen Jahren war die IT-Sicherheit eher ein Randgebiet, doch inzwischen ist sie in der Informatik, in Unternehmen und auch im Alltagsleben allgegenwärtig.
Noch vor wenigen Jahren war die IT-Sicherheit eher ein Randgebiet, doch inzwischen ist sie in der Informatik, in Unternehmen und auch im Alltagsleben allgegenwärtig.
Dieses kompakte Grundlagen-Lehrbuch orientiert sich in Inhalt und Aufbau an einer einführenden Vorlesung zum Thema Mensch-Maschine-Interaktion und lehnt sich an das von der Association for Computing Machinery (ACM) vorgeschlagene Curriculum des Gebiets an.
Dieses kompakte Grundlagen-Lehrbuch orientiert sich in Inhalt und Aufbau an einer einführenden Vorlesung zum Thema Mensch-Maschine-Interaktion und lehnt sich an das von der Association for Computing Machinery (ACM) vorgeschlagene Curriculum des Gebiets an.
This conference proceedings summarizes invited publications from the two IDES (Institute of Doctors Engineers and Scientists) International conferences, both held in Bangalore/ India.
The focus of this book is an application of Digital Twin as a concept and an approach, based on the most accurate view on a physical production system and its digital representation of complex engineering products and systems.
This book aims to show that modern socio-economic and entrepreneurial systems are on the path to the increase of security and to determine the obstacles they face on this path, as well as determine the opportunities for overcoming these obstacles.
This book provides a comprehensive and self-contained introduction to federated learning, ranging from the basic knowledge and theories to various key applications.
This book presents an overview on security and privacy issues in dynamic sensor networks and Internet of Things (IoT) networks and provides a novel tamper evident technique to counter and defend against these security related issues.
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation.
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation.
This collection of research papers provides extensive information on deploying services, concepts, and approaches for using open linked data from libraries and other cultural heritage institutions.
This book covers the basics of semantic web technologies and indexing languages, and describes their contribution to improve methods of formal knowledge representation and reasoning.
This contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts.
This book contains practical steps business users can take to implement data management in a number of ways, including data governance, data architecture, master data management, business intelligence, and others.
In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications.
This book covers the basics of semantic web technologies and indexing languages, and describes their contribution to improve methods of formal knowledge representation and reasoning.