Browse Results

Showing 83,151 through 83,175 of 83,235 results

Semantic Interoperability Issues, Solutions, Challenges


Semantic technologies are experimenting an increasing popularity in the context of different domains and applications. The understanding of any class of system can be significantly changed under the assumption any system is part of a global ecosystem known as Semantic Web.The Semantic Web would be an evolving extension of current Web model (normally referred as Syntactic Web) that introduces a semantic layer in which semantics, or meaning of information, are formally defined.So, semantics should integrate web-centric standard information infrastructures improving several aspects of interaction among heterogeneous systems. This is because common interoperability models are progressively becoming obsolete if compared with the intrinsic complexity and always more distributed focus that feature modern systems. For example, the basic interoperability model, that assumes the interchange of messages among systems without any interpretation, is simple but effective only in the context of close environments. Also more advanced models, such as the functional interoperability model that integrates basic interoperability model with the ability of intepretating data context under the assumption of a shared schema for data fields accessing, appears not able to provide a full sustainable technologic support for open systems.The Semantic Interoperability model would improve common interoperability models introducing the interpretation of means of data. Semantic interoperability is a concretely applicable interaction model under the assumption of adopting rich data models (commonly called Ontology) composed of concepts within a domain and the relationships among those concepts.In practice, semantic technologies are partially inverting the common view at actor intelligence: intelligence is not implemented (only) by actors but it is implicitly resident in the knowledge model. In other words, schemas contain information and the "code" to interpretate it.

Shaping the Future of IoT with Edge Intelligence: How Edge Computing Enables the Next Generation of IoT Applications (River Publishers Series in Communications and Networking)


This book presents the technologies that empower edge intelligence, along with their use in novel IoT solutions. Specifically, it presents how 5G/6G, Edge AI, and Blockchain solutions enable novel IoT-based decentralized intelligence use cases at the edge of the cloud/edge/IoT continuum. Emphasis is placed on presenting how these technologies support a wide array of functional and non-functional requirements spanning latency, performance, cybersecurity, data protection, real-time performance, energy efficiency, and more. The various chapters of the book are contributed by several EU-funded projects, which have recently developed novel IoT platforms that enable the development and deployment of edge intelligence applications based on the cloud/edge paradigm. Each one of the projects employs its own approach and uses a different mix of networking, middleware, and IoT technologies. Therefore, each of the chapters of the book contributes a unique perspective on the capabilities of enabling technologies and their integration in practical real-life applications in different sectors. The book is structured in five distinct parts. Each one of the first four parts focuses on a specific set of enabling technologies for edge intelligence and smart IoT applications in the cloud/edge/IoT continuum. Furthermore, the fifth part provides information about complementary aspects of next-generation IoT technology, including information about business models and IoT skills. Specifically: The first part focuses on 5G/6G networking technologies and their roles in implementing edge intelligence applications. The second part presents IoT applications that employ machine learning and other forms of Artificial Intelligence at the edge of the network. The third part illustrates decentralized IoT applications based on distributed ledger technologies. The fourth part is devoted to the presentation of novel IoT applications and use cases spanning the cloud/edge/IoT continuum. The fifth part discusses complementary aspects of IoT technologies, including business models and digital skills.

Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement


Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Fachleute/Personen aus Wissenschaft, Design, Entwicklung und Anwendung.

Simulieren und Entscheiden: Entscheidungsmodellierung, Modellierungsentscheidungen, Entscheidungsunterstützung (Sozialwissenschaftliche Simulationen und die Soziologie der Simulation)


Simulationen geben zunehmend Orientierung für die Entscheidungsfindung in Politik, Ökonomie, Ökologie oder Medizin. Hierzu sind zunächst Modelle zu bilden, wobei die Modellierungsentscheidungen einen großen Effekt auf die Simulationsergebnisse haben. Dieses Zusammenhangs nimmt sich der vorliegende Band an und durchleuchtet Computersimulationen im Kontext von Entscheidungen aus Sicht der Soziologie, Simulationswissenschaft und Philosophie. Dabei stehen drei Fragen im Mittelpunkt: Wie werden Entscheidungen modelliert oder simuliert? Welche metatheoretischen und methodischen Entscheidungen müssen simulierende WissenschaftlerInnen im Zuge der Simulationsstudie treffen? Wie werden organisationale oder politische Entscheidungen durch Modellierungen und Simulationen unterstützt? Die Herausgeber*innenProf. Dr. Nicole J. Saam ist Inhaberin des Lehrstuhls für Methoden der empirischen Sozialforschung am Institut für Soziologie der Friedrich-Alexander Universität Erlangen-Nürnberg. Prof. Michael Resch ist Direktor am HPC Center Stuttgart (HLRS) der Universität Stuttgart. Dr. Andreas Kaminski ist als Leiter der Abteilung “Philosophie der Simulation“ am HPC Center Stuttgart (HLRS) der Universität Stuttgart tätig.

Sixty Shades of Generalized Continua: Dedicated to the 60th Birthday of Prof. Victor A. Eremeyev (Advanced Structured Materials #170)


In this book, well-known scientists discuss modern aspects of generalized continua, in order to better understand modern materials and advanced structures. They possess complicated internal structure, and it requires the development of new approaches to model such structures and new effects caused by it. This book combines fundamental contributions in honor of Victor Eremeyev and his 60th birthday.

Smart Cities: Power Electronics, Renewable Energy, and Internet of Things


This book discusses the integration of power electronics, renewable energy, and the Internet of Things (IoT) from the perspective of smart cities in a single volume. The text will be helpful for senior undergraduate, graduate students and academic researchers in diverse engineering fields including electrical, electronics and communication, and computers. The book: Covers the integration of power electronics, energy harvesting, and the IoT for smart city applications. Discusses concepts of power electronics and the IoT in electric vehicles for smart cities. Examines the integration of power electronics in renewable energy for smart cities. Discusses important concepts of energy harvesting including solar energy harvesting, maximum power point tracking (MPPT) controllers, and switch-mode power supplies (SMPS). Explores IoT connectivity technologies such as long-term evolution (LTE), narrow band NB-IoT, long-range (LoRa), Bluetooth, and ZigBee (IEEE Standard 802.15.4) for low data rate wireless personal communication applications. The text provides the knowledge about applications, technologies, and standards of power electronics, renewable energy, and IoT for smart cities. It will serve as an ideal reference text for senior undergraduate, graduate students and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, civil engineering, and environmental engineering.

Smart Computing: Proceedings of the 1st International Conference on Smart Machine Intelligence and Real-Time Computing (SmartCom 2020), 26-27 June 2020, Pauri, Garhwal, Uttarakhand, India


The field of SMART technologies is an interdependent discipline. It involves the latest burning issues ranging from machine learning, cloud computing, optimisations, modelling techniques, Internet of Things, data analytics, and Smart Grids among others, that are all new fields. It is an applied and multi-disciplinary subject with a focus on Specific, Measurable, Achievable, Realistic & Timely system operations combined with Machine intelligence & Real-Time computing. It is not possible for any one person to comprehensively cover all aspects relevant to SMART Computing in a limited-extent work. Therefore, these conference proceedings address various issues through the deliberations by distinguished Professors and researchers. The SMARTCOM 2020 proceedings contain tracks dedicated to different areas of smart technologies such as Smart System and Future Internet, Machine Intelligence and Data Science, Real-Time and VLSI Systems, Communication and Automation Systems. The proceedings can be used as an advanced reference for research and for courses in smart technologies taught at graduate level.

Smart Connected World: Technologies and Applications Shaping the Future


This book provides an overview of the emerging smart connected world, and discusses the roles and the usage of underlying semantic computing and Internet-of-Things (IoT) technologies. The book comprises ten chapters overall, grouped in two parts. Part I “Smart Connected World: Overview and Technologies” consists of seven chapters and provides a holistic overview of the smart connected world and its supporting tools and technologies. Part II “Applications and Case Studies” consists of three chapters that describe applications and case studies in manufacturing, smart cities, health, and more. Each chapter is self-contained and can be read independently; taken together, readers get a bigger picture of the technological and application landscape of the smart connected world. This book is of interest for researchers, lecturers, and practitioners in Semantic Web, IoT and related fields. It can serve as a reference for instructors and students taking courses in hybrid computing getting abreast of cutting edge and future directions of a connected ecosystem. It will also benefit industry professionals like software engineers or data scientists, by providing a synergy between Web technologies and applications. This book covers the most important topics on the emerging field of the smart connected world. The contributions from leading active researchers and practitioners in the field are thought provoking and can help in learning and further research. The book is a valuable resource that will benefit academics and industry. It will lead to further research and advancement of the field. Bharat K. Bhargava, Professor of Computer Science, Purdue University, United States

Smart Contracts: Technological, Business and Legal Perspectives


This book brings together a series of contributions by leading scholars and practitioners to examine the main features of smart contracts, as well as the response of key stakeholders in technology, business, government and the law. It explores how this new technology interfaces with the goals and content of contract law, introducing and evaluating several mechanisms to improve the 'observability' and reduce the costs of verifying contractual obligations and performance. It also outlines various 'design patterns' that ensure that end users are protected from themselves, prevent cognitive accidents, and translate expectations and values into more user-oriented agreements. Furthermore, the chapters map the new risks associated with smart contracts, particularly for consumers, and consider how they might be alleviated. The book also discusses the challenge of integrating data protection and privacy concerns into the design of these agreements and the broad range of legal knowledge and skills required. The case for using smart contracts goes beyond 'contracts' narrowly defined, and they are increasingly used to disrupt traditional models of business organisation. The book discusses so-called decentralised autonomous organisations and decentralised finance as illustrations of this trend.This book is designed for those interested in looking to deepen their understanding of this game-changing new legal technology.

Smart Distributed Embedded Systems for Healthcare Applications (Explainable AI (XAI) for Engineering Applications)


This book discusses the applications and optimization of emerging smart technologies in the field of healthcare. It further explains different modeling scenarios of the latest technologies in the healthcare system and compares the results to better understand the nature and progress of diseases in the human body, which would ultimately lead to early diagnosis and better treatment and cure of diseases with the help of distributed technology. Covers the implementation models using technologies such as artificial intelligence, machine learning, and deep learning with distributed systems for better diagnosis and treatment of diseases. Gives in-depth review of technological advancements like advanced sensing technologies such as plasmonic sensors, usage of RFIDs, and electronic diagnostic tools in the field of healthcare engineering. Discusses possibilities of augmented reality and virtual reality interventions for providing unique solutions in medical science, clinical research, psychology, and neurological disorders. Highlights the future challenges and risks involved in the application of smart technologies such as cloud computing, fog computing, IOT, and distributed computing in healthcare. Confers to utilize the AI and ML and associated aids in healthcare sectors in the post-Covid 19 period to revitalize the medical setup. Contributions included in the book will motivate technological developers and researchers to develop new algorithms and protocols in the healthcare field. It will serve as a vast platform for gaining knowledge regarding healthcare delivery, health- care management, healthcare in governance, and health monitoring approaches using distributed environments. It will serve as an ideal reference text for graduate students and researchers in diverse engineering fields including electrical, electronics and communication, computer, and biomedical fields.

Smart Embedded Systems: Advances and Applications


"Smart Embedded Systems: Advances and Applications" is a comprehensive guide that demystifies the complex world of embedded technology. The book journeys through a wide range of topics from healthcare to energy management, autonomous robotics, and wireless communication, showcasing the transformative potential of intelligent embedded systems in these fields. This concise volume introduces readers to innovative techniques and their practical applications, offers a comparative analysis of wireless protocols, and provides efficient resource allocation strategies in IoT-based ecosystems. With real-world examples and in-depth case studies, it serves as an invaluable resource for students and professionals seeking to harness the power of embedded technology to shape our digital future. Salient Features: 1. The book provides a comprehensive coverage of various aspects of smart embedded systems, exploring their design, implementation, optimization, and a range of applications. This is further enhanced by in-depth discussions on hardware and software optimizations aimed at improving overall system performance. 2. A detailed examination of machine learning techniques specifically tailored for data analysis and prediction within embedded systems. This complements the exploration of cutting-edge research on the use of AI to enhance wireless communications. 3. Real-world applications of these technologies are extensively discussed, with a focus on areas such as seizure detection, noise reduction, health monitoring, diabetic care, autonomous vehicles, and communication systems. This includes a deep-dive into different wireless protocols utilized for data transfer in IoT systems. 4. This book highlights key IoT technologies and their myriad applications, extending from environmental data collection to health monitoring. This is underscored by case studies on the integration of AI and IoT in healthcare, spanning topics from anomaly detection to informed clinical decision-making. Also featured is a detailed evaluation and comparison of different system implementations and methodologies. This book is an essential read for anyone interested in the field of embedded systems. Whether you're a student looking to broaden your knowledge base, researchers looking in-depth insights, or professionals planning to use this cutting-edge technology in real-world applications, this book offers a thorough grounding in the subject.

Smart Healthcare System Design: Security and Privacy Aspects (Advances in Learning Analytics for Intelligent Cloud-IoT Systems)


The purpose of this book is to help achieve a better integration between the work of researchers and practitioners in a single medium for capturing state-of-the-art IoT solutions in healthcare applications to address how to improve the proficiency of wireless sensor networks (WSNs) in healthcare. It explores possible automated solutions in everyday life, including the structures of healthcare systems built to handle large amounts of data, thereby improving clinical decisions; which is why this book will prove invaluable to professionals who want to increase their understanding of recent challenges in the IoT-enabled healthcare domain. The 14 chapters address various aspects of the IoT system, such as design challenges, theory, various protocols, and implementation issues, and also include several case studies. Smart Healthcare System: Security and Privacy Aspects covers the introduction, development, and applications of smart healthcare models that represent the current state-of-the-art of various domains. The primary focus will be on theory, algorithms, and their implementation targeted at real-world problems. It will deal with different applications to give the practitioner a flavor of how IoT architectures are designed and introduced into various situations. More particularly, this volume consists of 14 chapters contributed by authors well-versed in the subject who are devoted to reporting the latest findings on smart healthcare system design.

Smittestopp − A Case Study on Digital Contact Tracing (Simula SpringerBriefs on Computing #11)


This open access book describes Smittestopp, the first Norwegian system for digital contact tracing of Covid-19 infections, which was developed in March and early April 2020. The system was deployed after five weeks of development and was active for a little more than two months, when a drop in infection levels in Norway and privacy concerns led to shutting it down. The intention of this book is twofold. First, it reports on the design choices made in the development phase. Second, as one of the only systems in the world that collected population data into a central database and which was used for an entire population, we can share experience on how the design choices impacted the system's operation. By sharing lessons learned and the challenges faced during the development and deployment of the technology, we hope that this book can be a valuable guide for experts from different domains, such as big data collection and analysis, application development, and deployment in a national population, as well as digital tracing.

Social Engineering in Cybersecurity: Threats and Defenses


In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. Social engineering attacks have emerged as a formidable and often underestimated threat to information security. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks. The book seeks to equip cybersecurity professionals, IT practitioners, students, and anyone concerned with information security with the knowledge and tools needed to recognize, prevent, and mitigate the risks posed by social engineering. The scope of this textbook is broad and multifaceted. It covers a wide range of social engineering attack vectors, including phishing, vishing, pretexting, baiting, tailgating, impersonation, and more. Each attack vector is dissected, with detailed explanations of how they work, real-world examples, and countermeasures. Key Features • Comprehensive Coverage: Thorough exploration of various social engineering attack vectors, including phishing, vishing, pretexting, baiting, quid pro quo, tailgating, impersonation, and more. • Psychological Insights: In-depth examination of the psychological principles and cognitive biases that underlie social engineering tactics. • Real-World Case Studies: Analysis of real-world examples and high-profile social engineering incidents to illustrate concepts and techniques.• Prevention and Mitigation: Practical guidance on how to recognize, prevent, and mitigate social engineering attacks, including security best practices. • Ethical Considerations: Discussion of ethical dilemmas and legal aspects related to social engineering that emphasizes responsible use of knowledge. This comprehensive textbook on social engineering attacks provides a deep and practical exploration of this increasingly prevalent threat in cybersecurity. It covers a wide array of attack vectors, including phishing, vishing, pretexting, and more, offering readers an in-depth understanding of how these attacks work. The book delves into the psychology behind social engineering and examines the cognitive biases and emotional triggers that make individuals susceptible. Real-world case studies illustrate concepts and techniques while practical guidance equips readers with the knowledge to recognize, prevent, and mitigate social engineering threats.

Social Marketing and Advertising in the Age of Social Media (New Horizons in Marketing series)


Reviewing and analysing the most relevant concepts, theories and strategies related to the field, this timely book reveals what makes for strong social marketing and social advertising campaigns. With a comprehensive understanding of social advertising models and their applications, chapters present original case studies and scenarios from international researchers to illustrate strategies and concepts in practice. Exploring the mechanics of social media, contributors highlight what makes a successful campaign. They evaluate the use and impact of emotions in social power, exploring the power of storytelling, whilst weighing ethical implications. The book covers important and upcoming areas of interest in the field including the rise of social media influencers, the use of memes, the functionality of social media, and the use of fear, guilt and shame in communications campaigns as well as positive emotions. This book will assist marketing academics and practitioners in the development of successful campaigns as it highlights not only what these campaigns look like, but also why they achieve success. It will also prove an excellent guide for government organisations and public policy makers interested in using social marketing for health promotion and social change.

Social Media, Freedom of Speech, and the Future of our Democracy


A broad explanation of the various dimensions of the problem of "bad" speech on the internet within the American context. One of the most fiercely debated issues of this era is what to do about "bad" speech-hate speech, disinformation and propaganda campaigns, and incitement of violence-on the internet, and in particular speech on social media platforms such as Facebook and Twitter. In Social Media, Freedom of Speech, and the Future of our Democracy, Lee C. Bollinger and Geoffrey R. Stone have gathered an eminent cast of contributors--including Hillary Clinton, Amy Klobuchar, Sheldon Whitehouse, Newt Minow, Cass Sunstein, Jack Balkin, Emily Bazelon, and others--to explore the various dimensions of this problem in the American context. They stress how difficult it is to develop remedies given that some of these forms of "bad" speech are ordinarily protected by the First Amendment. Bollinger and Stone argue that it is important to remember that the last time we encountered major new communications technology-television and radio-we established a federal agency to provide oversight and to issue regulations to protect and promote "the public interest." Featuring a variety of perspectives from some of America's leading experts on this hotly contested issue, this volume offers new insights for the future of free speech in the social media era.

Social Media in Health Care: A Guide to Creating Your Professional Digital Presence


A practical, essential guide to social media for health care professionals, Social Media in Health Care equips readers with the skills to build their online brand, share their professional knowledge with a wider audience, and become a trusted source of information and thought leader in their field.Authors Mona Shattell, Melissa Batchelor, and Rebecca Darmoc explain the principles behind building a respected digital presence and developing meaningful online connections, while providing practical tips for navigating the five major social media platforms: Twitter, LinkedIn, Facebook, Instagram, and YouTube. Everyone from health care students to the most seasoned professionals will benefit from the 3C’s Framework outlined in the book: Consume, Contribute, and Create.Social Media in Health Care can be read cover to cover or used as quick reference guide. Topics include: Exercises for novice, intermediate, and advanced users Best practices for consuming, sharing, and creating content Tips for readers to build their social media presence and professional brand Recommendations for using digital platforms to expand professional networks Patient privacy concerns and how to avoid ethical pitfalls Social media can start conversations and serve as an open line of communication between peers, the public, and patients. Social Media in Health Care guides members of the medical community in how to use social media to help educate the public and specific patient communities about health care and health policy, make connections with industry leaders and peers, and enhance their professional reputation.

Social Media Politics: Digital Discord in the 2020 Presidential Election


Social media and social networking services are integrated into the American political process and have profoundly influenced political communication and participation. Social media platforms have transformed the political landscape by revolutionizing information dissemination, citizen engagement, and public opinion formation and change. Politicians use social media to communicate directly with voters in an unmediated and unfiltered manner. Comparatively, voters use social media to follow the latest messaging from politicians accompanied by demonstrating their support for particular politicians. This book is a comprehensive examination of the role of digital and social media in the 2020 U.S. presidential election. Political discourse during the 2020 election revealed political disharmony and a deep political division among vast swaths of Americans that was powered, in part, by social media. This book reveals how digital and social media have reshaped power dynamics by altering the relationships among citizens, politicians, and traditional media outlets, the emergence of new influencers, and the impact of online activism on policy agendas.This book, Social Media Politics, includes scholars with varied backgrounds and experience, using both quantitative and qualitative methodologies, from leading research institutions around the nation. Students, scholars, and practitioners will gain new knowledge to more clearly understand the role social media played in the 2020 presidential campaign.

Social Touch in Human–Robot Interaction: Symbiotic touch interaction between human and robot


In this book for researchers and students, editors Shiomi and Sumioka bring together contributions from researchers working on the CREST project at ATR Deep Interaction Laboratories, a world leader in social robotics, to comprehensively describe robot touch systems from hardware to applications.Appropriate touch from robots to humans is essential for social robots, but achieving this requires various solutions at every stage of the touch process. Through this book, readers will gain an understanding of the needs, essential systems and communication cues, behaviour designs, and real‑world issues for social touch applications. This book compiles and updates technical and empirical research that was previously scattered throughout the literature into a single volume. Through individually authored chapters addressing various elements of ATR’s CREST project, this book tackles key areas where understanding is needed to realize acceptable touch interaction, including pre‑touch interaction, interaction design for touching and being touched, behaviour changes caused by touch interaction, and applications of social touch interaction. It introduces a touch sensor and robots developed by the authors, including several touch‑related behaviours and design policies. This approach will enable readers to easily apply this knowledge to their own social robotics programs. This book is invaluable for anyone who wishes to understand and develop social robots that physically interact with people.It is most beneficial for researchers and upper undergraduate and graduate students in the fields of human–robot/agent/computer interaction and social touch interaction and those in the broader fields of engineering, computer science, and cognitive science.

Socio-Informatics


The book is an exploration of the theoretical, conceptual and methodological foundations of human-centred design. Specifically, it critically examines the notion of 'practice' and argues for an understanding of the concept which emanates from engagement with design problems rather than simply from social scientific theory. The contributors to the book in their various ways all subscribe to a systematic account of how practice- oriented studies can inform design. Using the perspective of 'grounded design', it pursues a long term view of the design process, arguing for user engagement from the very earliest stages of design policy, including methods for understanding user practices to inform initial design policies up to and including processes of appropriation as technologies are embedded in contexts of use. Grounded design is a perspective which also deals with the vexed problem of appropriate generalization in design studies and the kinds of cross-comparison that can usefully be done. The book contains a number of case studies which exemplify these themes, some of which are rooted in the use of technology in organizational contexts, others of which deal with design in contexts such as care of the elderly, firefighting and multicultural education.

Soft Computing Principles and Integration for Real-Time Service-Oriented Computing


In recent years, soft computing techniques have emerged as a successful tool to understand and analyze the collective behavior of service- oriented computing software. Algorithms and mechanisms of self- organization of complex natural systems have been used to solve problems, particularly in complex systems, which are adaptive, ever- evolving, and distributed in nature across the globe. What fits more perfectly into this scenario other than the rapidly developing era of Fog, IoT, and Edge computing environment? Service- oriented computing can be enhanced with soft computing techniques embedded inside the Cloud, Fog, and IoT systems.Soft Computing Principles and Integration for Real-Time Service-Oriented Computing explores soft computing techniques that have wide application in interdisciplinary areas. These soft computing techniques provide an optimal solution to the optimization problem using single or multiple objectives.The book focuses on basic design principles and analysis of soft computing techniques. It discusses how soft computing techniques can be used to improve quality-of-service in serviceoriented architectures. The book also covers applications and integration of soft computing techniques with a service- oriented computing paradigm. Highlights of the book include: A general introduction to soft computing An extensive literature study of soft computing techniques and emerging trends Soft computing techniques based on the principles of artificial intelligence, fuzzy logic, and neural networks The implementation of SOC with a focus on service composition and orchestration, quality of service (QoS) considerations, security and privacy concerns, governance challenges, and the integration of legacy systems The applications of soft computing in adaptive service composition, intelligent service recommendation, fault detection and diagnosis, SLA management, and security Such principles underlying SOC as loose coupling, reusability, interoperability, and abstraction An IoT based framework for real time data collection and analysis using soft computing

Software Ecosystems: Tooling and Analytics


This book highlights recent research advances in various domains related to software ecosystems such as library reuse, collaborative development, cloud computing, open science, sentiment analysis and machine learning. A key aspect of software ecosystems is that software products belong to ever more interdependent networks of co-evolving software components. The ever-increasing importance of social coding platforms has made software ecosystems indispensable to software practitioners, in commercial as well as open-source settings.The book starts with an introductory chapter that provides a historical account of the origins of software ecosystems. It provides the necessary context about the domain of software ecosystems by highlighting its different perspectives, definitions, and representations. It also exemplifies the variety of software ecosystems that have emerged during the previous decades. The remaining book is composed of five parts: Part I contains two chapters on software ecosystem representations, Part II two chapters that focus on complementary ways and techniques of analyzing software ecosystems. Next, Part III includes two chapters that focus on aspects related to the evolution within software ecosystems, while Part IV looks at workflow automation and infrastructure-as-code ecosystems. Finally, Part V focuses on ecosystems for software modeling and for data-intensive software.This book is intended for researchers and practitioners interested in data mining, tooling, and empirical analysis of software ecosystems. The reader will appreciate chapters that cover a wide spectrum of social and technical aspects of software ecosystems, each including an overview of the state of the art.Chapter 2 The Software Heritage Open Science Ecosystem is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Software Engineering Approaches to Enable Digital Transformation Technologies


Software Engineering Approaches to Enable Digital Transformation Technologies features contributions reflecting ideas and research in enabling digital transformation technologies through software engineering. To date, multiple, different approaches have been adopted to develop software solutions for a variety of different problems. Of all the available approaches, the main approaches are level-oriented, data flow-oriented, data structure-oriented, and object-oriented design approaches. The other focus of the book is digital transformation, which can be defined as the adoption of digital technology to improve efficiency, value, and innovation Digitalization is more than just putting additional technological systems and services in place. Rather than improving conventional methods, a true digital transformation initiative includes radically rethinking company structures and procedures. There are four types of digital transformation: business process, business model, domain, and cultural and organizational. Companies are being challenged to develop new business models that consider and harness digitalization. From the standpoint of software engineering, digital transformation alters how software is built. Current trends include the development of mobile applications, cloud applications, and Internet of Things (IoT) applications. Emerging trends are the development of digital twins, robotics, artificial intelligence, machine learning, augmented reality, and additive manufacturing. This book examines the challenges that arise due to digitization in society and presents plausible solutions that could be applied to counter these challenges and convert them into opportunities. These solutions may further be improvised and worked out for the software companies from the technological perspective, organizational perspective, and management perspective.

Software Engineering for Games in Serious Contexts: Theories, Methods, Tools, and Experiences


The book highlights several challenges and opportunities in the field of software engineering for serious games. It covers a wide range of topics from game design principles to software architecture, testing, and deployment and is structured into two parts. While Part I delves into various aspects of designing, maintaining, adapting, and evaluating games in serious contexts; Part II focuses on the experiences of realizing and using games in serious contexts.One of the primary challenges is to develop effective methods for evaluating serious games and measuring their impact and outcomes. Another challenge is to design serious games that are both engaging and effective, which requires a deep understanding of game design principles and instructional design. The book also emphasizes the need to develop effective software engineering practices for serious game development and the importance of gamification in improving user engagement and motivation. The potential of serious games for addressing societal challenges such as cybersecurity and healthcare is also highlighted. Despite these challenges, the book also identifies several opportunities for the field, including the potential of serious games to provide new and innovative approaches to learning and the potential of serious games to address real-world problems in new and effective ways.This book is intended for software engineers, game developers, educators, and anyone interested in how games in serious contexts can be effectively created. Overall, the chapters in the book provide a valuable snapshot of the current state of the field and offer insights into where it may be headed in the future.

Software Engineering for Robotics


The topics covered in this book range from modeling and programming languages and environments, via approaches for design and verification, to issues of ethics and regulation. In terms of techniques, there are results on model-based engineering, product lines, mission specification, component-based development, simulation, testing, and proof. Applications range from manufacturing to service robots, to autonomous vehicles, and even robots than evolve in the real world. A final chapter summarizes issues on ethics and regulation based on discussions from a panel of experts. The origin of this book is a two-day event, entitled RoboSoft, that took place in November 2019, in London. Organized with the generous support of the Royal Academy of Engineering and the University of York, UK, RoboSoft brought together more than 100 scientists, engineers and practitioners from all over the world, representing 70 international institutions. The intended readership includes researchers and practitioners with all levels of experience interested in working in the area of robotics, and software engineering more generally. The chapters are all self-contained, include explanations of the core concepts, and finish with a discussion of directions for further work.Chapters 'Towards Autonomous Robot Evolution', 'Composition, Separation of Roles and Model-Driven Approaches as Enabler of a Robotics Software Ecosystem' and 'Verifiable Autonomy and Responsible Robotics' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Refine Search

Showing 83,151 through 83,175 of 83,235 results