Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Language
Region
Virtual Catalogues
Years
Access
  • 1
    UID:
    almafu_9960077470202883
    Format: 1 online resource (x, 324 pages) : , illustrations
    ISBN: 3-030-88662-X
    Content: This open access book highlights the interdisciplinary aspects of logistics research. Featuring empirical, methodological, and practice-oriented articles, it addresses the modelling, planning, optimization and control of processes. Chiefly focusing on supply chains, logistics networks, production systems, and systems and facilities for material flows, the respective contributions combine research on classical supply chain management, digitalized business processes, production engineering, electrical engineering, computer science and mathematical optimization. To celebrate 25 years of interdisciplinary and collaborative research conducted at the Bremen Research Cluster for Dynamics in Logistics (LogDynamics), in this book hand-picked experts currently or formerly affiliated with the Cluster provide retrospectives, present cutting-edge research, and outline future research directions.
    Note: Part I: Models and Methods for Planning in Logistics Autonomous Control of Logistics Processes A Retrospective Explorable Uncertainty meets Decision-Making in Logistics Complex Networks in Manufacturing and Logistics: A Retrospect Recent Developments in Mathematical Traffic Models Part II: Digitalization and Logistics Intelligent Agents for Social and Learning Logistics Systems Semantic Interoperability for Logistics and Be yond Semantic Digital Twins for Retail Logistics A Demand-Response System for Sustainable Manufacturing Using Linked Data and Machine Learning The Influence of Cognitive Biases in Production Logistics Part III: Fields of Application in Logistics Automobile Logistics 4.0Advances through Digitalization15 Years of Intelligent Container Research The Rise of Ultra Large Container Vessels: Implications for Seaport Systems and Environmental Considerations Modeling individualized sustainable last mile logistics Logistics Challenges along the New Silk Roads Observations and Perceptions on a Doctoral Research Seminar in Engineering and Logistics , English
    Additional Edition: ISBN 3-030-88661-1
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949602151202882
    Format: 1 online resource (123 pages)
    Edition: 1st ed.
    ISBN: 9783319749501
    Series Statement: Simula SpringerBriefs on Computing Series ; v.4
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Introduction -- 1.1 A New Situation -- 1.2 What Are We Afraid Of? -- 1.3 Huawei and ZTE -- 1.4 Trust in Vendors -- 1.5 Points of Attack -- 1.6 Trust in Vendors Is Different from Computer Security -- 1.7 Why the Problem Is Important -- 1.8 Advice for Readers -- References -- 2 Trust -- 2.1 Prisoner's Dilemma -- 2.2 Trust and Game Theory -- 2.3 Trust and Freedom of Choice -- 2.4 Trust, Consequence, and Situation -- 2.5 Trust and Security -- 2.6 Trusted Computing Base -- Trust Between Components -- 2.7 Discussion -- References -- 3 What Is an ICT System? -- 3.1 Transistors and Integrated Circuits -- 3.2 Memory and Communication -- 3.3 Processors and Instruction Sets -- 3.4 Firmware -- 3.5 Operating Systems, Device Drivers, Hardware Adaptation Layers, and Hypervisors -- 3.6 Bytecode Interpreters -- 3.7 The Application on Top -- 3.8 Infrastructures and Distributed Systems -- 3.9 Discussion -- References -- 4 Development of ICT Systems -- 4.1 Software Development -- 4.2 Hardware Development -- 4.3 Security Updates and Maintenance -- 4.4 Discussion -- References -- 5 Theoretical Foundation -- 5.1 Gödel and the Liar's Paradox -- 5.2 Turing and the Halting Problem -- 5.3 Decidability of Malicious Behaviour -- 5.4 Is There Still Hope? -- 5.5 Where Does This Lead Us? -- References -- 6 Reverse Engineering of Code -- 6.1 Application of Reverse Engineering in ICT -- 6.2 Static Code Analysis -- 6.3 Disassemblers -- 6.4 Decompilers -- 6.5 Debuggers -- 6.6 Anti-reversing -- 6.7 Hardware -- 6.8 Discussion -- References -- 7 Static Detection of Malware -- 7.1 Malware Classes -- 7.2 Signatures and Static Code Analysis -- 7.3 Encrypted and Oligomorphic Malware -- 7.4 Obfuscation Techniques -- 7.5 Polymorphic and Metamorphic Malware -- 7.6 Heuristic Approaches -- 7.7 Malicious Hardware. , 7.8 Specification-Based Techniques -- 7.9 Discussion -- References -- 8 Dynamic Detection Methods -- 8.1 Dynamic Properties -- 8.2 Unrestricted Execution -- 8.3 Emulator-Based Analysis -- 8.4 Virtual Machines -- 8.5 Evasion Techniques -- 8.6 Analysis -- 8.7 Hardware -- 8.8 Discussion -- References -- 9 Formal Methods -- 9.1 Overview -- 9.2 Specification -- 9.3 Programming Languages -- 9.4 Hybrid Programming and Specification Languages -- 9.5 Semantic Translation -- 9.6 Logics -- 9.7 Theorem Proving and Model Checking -- 9.8 Proof-Carrying Code -- 9.9 Conclusion -- References -- 10 Software Quality and Quality Management -- 10.1 What is Software Quality Management? -- 10.2 Software Development Process -- 10.3 Software Quality Models -- 10.4 Software Quality Management -- 10.5 Software Quality Metrics -- 10.6 Standards -- 10.7 Common Criteria (ISO/IEC 15408) -- 10.8 Software Testing -- 10.9 Verification Through Formal Methods -- 10.10 Code Review -- 10.11 Discussion -- References -- 11 Containment of Untrusted Modules -- 11.1 Overview -- 11.2 Partial Failures and Fault Models -- 11.3 Erlang: A Programming Language Supporting Containment -- 11.4 Microservices: An Architecture Model Supporting Containment -- 11.5 Hardware Containment -- 11.6 Discussion -- References -- 12 Summary and Way Forward -- 12.1 Summary of Findings -- 12.2 The Way Forward -- 12.2.1 Encryption -- 12.2.2 Formal Methods -- 12.2.3 Heterogeneity and Containment -- 12.3 Concluding Remarks.
    Additional Edition: Print version: Lysne, Olav The Huawei and Snowden Questions Cham : Springer International Publishing AG,c2018 ISBN 9783319749495
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Electronic books. ; Electronic books
    URL: OAPEN
    URL: OAPEN
    URL: OAPEN  (Creative Commons License)
    URL: Full-text  ((OIS Credentials Required))
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9949301298302882
    Format: 1 online resource (327 pages)
    ISBN: 9789813344006
    Note: Intro -- Preface -- Committees -- Honorary Advisors -- Organization Committees -- Scientific Committees (list by surname) -- Contents -- Machine Thinking -- Machinic Phylum and Architecture -- 1 Nips and Bites -- 2 Ducks and Rabbits -- References -- Pipes of AI - Machine Learning Assisted 3D Modeling Design -- 1 Principle of CNN -- 1.1 Principle and Applications of Style Transfer -- 1.2 Project Goal -- 2 2D Image Representation of 3D Volume -- 2.1 The Effect of Style Weight in Style Transfer -- 2.2 Transformation of Image to Geometry -- 2.3 Algorithm Analysis of Geometry Generation Between Adjacent Layers -- 3 Result of Section Plans -- 3.1 Result of Perspective View -- 4 Conclusion -- References -- Developing a Digital Interactive Fabrication Process in Co-existing Environment -- 1 Introduction -- 2 Related Work -- 2.1 Fabrication Process of Maker -- 2.2 Towards Co-existing Environment -- 2.3 Automation Digital Fabrication Tools -- 2.4 Summary -- 3 Methodology -- 4 The Experiment -- 5 Conclusions -- References -- Real-Time Defect Recognition and Optimized Decision Making for Structural Timber Jointing -- 1 Introduction -- 2 Defect Recognition and Removal -- 2.1 Pre-process the Image for Segmentation -- 2.2 Preparation of the Classifier -- 2.3 Preparation of the Classifier -- 3 Decision Making for Joining Timber Segments -- 4 User Interface -- 5 Discussion and Future Development -- 6 Conclusion -- References -- On-Site BIM-Enabled Augmented Reality for Construction -- 1 Introduction -- 1.1 Motivation -- 1.2 Related Work -- 1.3 Our Solution -- 2 AR Application -- 2.1 Model Overlay Using Augmented Reality -- 2.2 Model Interaction as Query System -- 2.3 Abstraction of Drawings -- 2.4 Additional Features -- 3 Data Pipeline -- 3.1 BIM Pre-processing, Custom Parameter Creation and Population. , 3.2 Construction Document Export and Metadata Post-processing -- 4 Unity Reflect -- 5 Results -- 5.1 Case Study/User Testing -- 5.2 Future Development -- 5.3 Connections -- References -- Recycling Construction Waste Material with the Use of AR -- 1 Introduction -- 2 Aims -- 3 Method -- 3.1 Method 1 | Mass Customisation and Working to a Fixed Digital Model -- 3.2 Mass Customized Aggregation Geometry -- 3.3 Holographic Part Nesting -- 3.4 Mixed Reality Interface -- 3.5 Jointing -- 3.6 Fabrication and Fixing Methods -- 3.7 Method 2 | Working to a Flexible Digital Model -- 3.8 Results -- 4 Discussion -- 4.1 Future Development -- References -- Growing Shapes with a Generalised Model from Neural Correlates of Visual Discrimination -- 1 Introduction -- 2 Methods -- 3 Results -- 4 Conclusion -- References -- Cyborgian Approach of Eco-interaction Design Based on Machine Intelligence and Embodied Experience -- 1 Tracing Cyborgian Theory and Embodied Cognition -- 1.1 A Hybrid of Part Clock Part Swarm [10] -- 1.2 The Importance of the Presence and the Bodily Experience -- 2 How Cyborgian Approach Activates Plants? -- 2.1 How They Sense -- 2.2 How They Think -- 2.3 How They Actuate -- 3 How Cyborgian Approach Encourages Human Participation? -- 3.1 Experience Level -- 3.2 Experience Assessment -- 4 Design an Interactive Outdoor Environment -- 4.1 Challenges and Opportunities of Outdoor Interaction -- 4.2 A Cyborgian Eco-interaction Design Model -- 5 Conclusion and Outlook -- References -- Machine Seeing -- A Large-Scale Measurement and Quantitative Analysis Method of Façade Color in the Urban Street Using Deep Learning -- 1 Introduction -- 2 Literature Review -- 2.1 Urban Color Planning -- 2.2 Façade Color Measurements -- 2.3 Quantitative Analysis of Visual Quality in Urban Street -- 3 Methodology -- 3.1 Study Area and Workflow -- 3.2 Street View Data Acquisition. , 3.3 Building Façade Segmentation and Data Cleaning -- 3.4 Façade Color Calculation -- 4 Results -- 5 Discussion and Conclusion -- References -- Suggestive Site Planning with Conditional GAN and Urban GIS Data -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Acquisition and Feature Engineering -- 3.2 Machine Learning -- 3.3 Visualization -- 4 Case Study: Taking Boston as Example -- 4.1 Data Acquisition and Feature Engineering -- 4.2 Model Building and Training -- 4.3 Results and Visualization -- 5 Summary -- References -- Understanding and Analyzing the Characteristics of the Third Place in Urban Design: A Methodology for Discrete and Continuous Data in Environmental Design -- 1 Background -- 2 Methodology -- 2.1 Data and Data Structure for Manipulation -- 2.2 Pixel Structure for Continuous Data and Blending Data with Neighbors -- 2.3 Graph Structure for Discrete Data -- 3 Case Study Implementation -- 3.1 Site Selection -- 3.2 Parse Third Place Data and Visualization -- 3.3 Generate Data Structures and Inspect with Visualizations -- 3.4 Comparisons and Results -- 4 Discussion -- 5 Conclusion -- 6 Future Work -- References -- Sensing the Environmental Neighborhoods -- 1 Introduction -- 1.1 Sensing Kit Design -- 1.2 Case Study -- 1.3 Summary -- References -- A Performance-Based Urban Block Generative Design Using Deep Reinforcement Learning and Computer Vision -- 1 Introduction -- 2 Methodology -- 2.1 DRL Based Generative Design Framework -- 2.2 DDPG Agent -- 2.3 Hough Transform -- 3 Case Study -- 3.1 Observation, Action and Reward -- 3.2 Site Information -- 4 Results -- 5 Conclusions and Future Work -- References -- The Development of 'Agent-Based Parametric Semiology' as Design Research Program -- 1 Theory Background -- 2 Why We Need Agent-Based Life-Process Crowd Simulation. , 3 The Intelligence Upgrading of Agent-Based Crowd Simulation -- 3.1 Crowd Behaviour Pattern Analysis -- 3.2 Intelligent Agents -- 3.3 Semantic Virtual Environment -- 4 Quantitative Analysis, Evaluation, and Optimization -- 4.1 Methodology and Toolset -- 4.2 Scenario and Example -- 5 Discussion -- References -- Machine Learning -- Machine Learning Aided 2D-3D Architectural Form Finding at High Resolution -- 1 Introduction -- 2 Relative Work -- 3 Method -- 4 Results -- 4.1 Training Data Preparation -- 4.2 Main Network Training -- 4.3 Multiple Network Training -- 5 Conclusion -- References -- Exploration of Campus Layout Based on Generative Adversarial Network -- 1 Introduction -- 2 Related Work in the Field of Architectural Layout -- 3 Methods -- 4 Experimental Results and Analysis -- 5 Discussion -- Appendix -- References -- A Preliminary Study on the Formation of the General Layouts on the Northern Neighborhood Community Based on GauGAN Diversity Output Generator -- 1 Introduction -- 2 Research -- 2.1 AI Application in Architecture -- 2.2 Deep Learning Architectural Plan Generator Application -- 3 Methodology -- 3.1 GauGAN -- 3.2 Step Training -- 4 Machine Learning for the General Layout Shapes of the Northern Neighborhoods in China -- 4.1 Morphological Analysis -- 4.2 Data Conversion -- 4.3 Model Architecture -- 4.4 Vectorization and 3D Procedural Modeling -- 4.5 Experiment Result -- 5 Conclusion -- 5.1 GauGAN Is More in Line with Architectural Design Needs Than Pix2pix (Pix2pixHD) -- 5.2 The Use of Step Training Can Improve the Clarity of Generated Results and Allow the Later Vectorization to Be More Convenient -- References -- Artificial Intuitions of Generative Design: An Approach Based on Reinforcement Learning -- 1 Introduction -- 1.1 Contemporary Algorithmic Generative System -- 1.2 Artificial Intuitions -- 2 Background. , 2.1 Machine Learning with Generative Design -- 2.2 Reinforcement Learning -- 3 Methodology -- 3.1 Intuitive Random Walk Formation -- 3.2 RL Actions Definition -- 3.3 RL Observations Definition -- 3.4 RL Reward Definition -- 4 Discussions -- 4.1 Training Process and Outcomes -- 4.2 Further Research -- 5 Conclusions -- References -- Collection to Creation: Playfully Interpreting the Classics with Contemporary Tools -- 1 Introduction: Generations to Generative -- 2 Process: Beyond Codified Interaction -- 3 User Analysis -- 4 Media Creation -- 5 Synthetic Text Descriptions -- 6 Thoughts -- 7 Conclusion -- References -- embedGAN: A Method to Embed Images in GAN Latent Space -- 1 Introduction -- 2 Related Work -- 2.1 Regenerating Data in GAN -- 2.2 GAN Latent Walk -- 3 Method -- 3.1 Principle -- 3.2 Architecture -- 3.3 Training Details -- 4 Application -- 5 Evaluation -- 6 Conclusion -- References -- Research on Architectural Form Optimization Method Based on Environmental Performance-Driven Design -- 1 Introduction -- 2 Performance-Driven Design and Its Advantages -- 2.1 Performance-Driven Design Theory -- 2.2 Performance-Driven Design Advantages Compared with Bionic Form Design -- 3 Performance-Driven Architectural Form Optimization Method -- 3.1 Combined with Parametric Design -- 4 Form Optimization Simulation Process Establishment -- 5 Design Practice -- 5.1 Project Background -- 5.2 Design Parameters Selection and Numerical Constraint -- 5.3 Setting Simulation Parameters -- 5.4 Form Optimization Process Diagram -- 5.5 Result Analysis -- 6 Conclusion -- References -- Optimization and Prediction of Design Variables Driven by Building Energy Performance-A Case Study of Office Building in Wuhan -- 1 Introduction -- 2 Research Method -- 2.1 Research Objectives -- 2.2 Research Method. , 2.3 Multi-Island Genetic Algorithm (MIGA) and Radial Basis Functions Artificial Neural Networks (RBF-ANNs).
    Additional Edition: Print version: Yuan, Philip F. Proceedings of the 2020 DigitalFUTURES Singapore : Springer Singapore Pte. Limited,c2021 ISBN 9789813343993
    Language: English
    Subjects: Computer Science , Engineering
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books. ; Konferenzschrift ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: FULL  ((Currently Only Available on Campus))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV035414111
    Format: 1 Online-Ressource , Illustrationen , 24 cm
    Edition: Online_Ausgabe Boulder, Colo NetLibrary 2005 E-Books von NetLibrary Sonstige Standardnummer des Gesamttitels: 22382847
    ISBN: 3540259821
    Series Statement: Lecture notes in computer science 3095
    Note: Includes bibliographical references and author index
    Additional Edition: Reproduktion von Web services, E-Business, and the Semantic Web 2004
    Language: English
    Keywords: Web Services ; Electronic Commerce ; World Wide Web ; Semantisches Netz ; Semantic Web ; Konferenzschrift ; Electronic books.
    URL: Full text  (Click to View (Currently Only Available on Campus))
    Author information: Bussler, Christoph 1964-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949319961302882
    Format: 1 online resource (371 pages)
    ISBN: 9783030945909
    Note: Intro -- Preface -- Acknowledgments -- Contents -- Editors and Contributors -- About the Editors -- Contributors -- Abbreviations -- Part I Big Data and AI Technologies for Digital Finance -- 1 A Reference Architecture Model for Big Data Systems in the Finance Sector -- 1 Introduction -- 1.1 Background -- 1.2 Big Data Challenges in Digital Finance -- 1.2.1 Siloed Data and Data Fragmentation -- 1.2.2 Real-Time Computing -- 1.2.3 Mobility -- 1.2.4 Omni-channel Banking: Multiple Channel Management -- 1.2.5 Orchestration and Automation: Toward MLOps and AIOps -- 1.2.6 Transparency and Trustworthiness -- 1.3 Merits of a Reference Architecture (RA) -- 1.4 Chapter Structure -- 2 Related Work: Architectures for Systems in Banking and Digital Finance -- 2.1 IT Vendors' Reference Architectures -- 2.2 Reference Architecture for Standardization Organizations and Industrial Associations -- 2.3 Reference Architectures of EU Projects and Research Initiatives -- 2.4 Architectures for Data Pipelining -- 2.5 Discussion -- 3 The INFINITECH Reference Architecture (INFINITECH-RA) -- 3.1 Driving Principles: INFINITECH-RA Overview -- 3.2 The INFINITECH-RA -- 3.2.1 Logical View of the INFINITECH-RA -- 3.2.2 Development Considerations -- 3.2.3 Deployment Considerations -- 4 Sample Pipelines Based on the INFINITECH-RA -- 4.1 Simple Machine Learning Pipeline -- 4.2 Blockchain Data-Sharing and Analytics -- 4.3 Using the INFINITECH-RA for Pipeline Development and Specification -- 5 Conclusions -- References -- 2 Simplifying and Accelerating Data Pipelines in Digital Finance and Insurance Applications -- 1 Introduction -- 2 Challenges in Data Pipelines in Digital Finance and Insurance -- 2.1 IT Cost Savings -- 2.2 Productivity Improvements -- 2.3 Reduced Regulatory and Operational Risks -- 2.4 Delivery of New Capabilities and Services. , 3 Regular Data Pipeline Steps in Digital Finance and Insurance -- 3.1 Data Intaking -- 3.2 Data Transformation -- 3.3 Generate the Required Output -- 4 How LeanXcale Simplifies and Accelerates Data Pipelines -- 4.1 High Insertion Rates -- 4.2 Bidimensional Partitioning -- 4.3 Online Aggregates -- 4.4 Scalability -- 5 Exploring New Use Cases: The INFINITECH Approach to Data Pipelines -- 6 Conclusion -- References -- 3 Architectural Patterns for Data Pipelines in Digital Finance and Insurance Applications -- 1 Introduction -- 1.1 Motivation -- 1.2 Data Pipelining Architectural Pattern Catalogue and How LeanXcale Simplifies All of Them -- 2 A Taxonomy of Databases for Data Pipelining -- 2.1 Database Taxonomy -- 2.1.1 Operational Databases -- 2.1.2 Data Warehouses -- 2.1.3 Data Lakes -- 2.2 Operational Database Taxonomy -- 2.2.1 Traditional SQL Databases -- 2.2.2 NoSQL Databases -- 2.2.3 NewSQL Databases -- 2.3 NoSQL Database Taxonomy -- 2.3.1 Key-Value Data Stores -- 2.3.2 Document-Oriented Databases -- 2.3.3 Graph Databases -- 2.3.4 Wide-Column Data Stores -- 3 Architectural Patterns Dealing with Current and Historical Data -- 3.1 Lambda Architecture -- 3.2 Beyond Lambda Architecture -- 3.3 Current Historical Data Splitting -- 3.4 From Current Historical Data Splitting to Real-Time Data Warehousing -- 4 Architectural Patterns for Off-Loading Critical Databases -- 4.1 Data Warehouse Off-Loading -- 4.2 Simplifying Data Warehouse Off-Loading -- 4.3 Operational Database Off-Loading -- 4.4 Operational Database Off-Loading at Any Scale -- 4.5 Database Snapshotting -- 4.6 Accelerating Database Snapshotting -- 5 Architectural Patterns Dealing with Aggregations -- 5.1 In-Memory Application Aggregation -- 5.2 From In-Memory Application Aggregation to Online Aggregation -- 5.3 Detail-Aggregate View Splitting -- 5.4 Avoiding Detail-Aggregate View Splitting. , 6 Architectural Patterns Dealing with Scalability -- 6.1 Database Sharding -- 6.2 Removing Database Sharding -- 7 Data Pipelining in INFINITECH -- 8 Conclusions -- 4 Semantic Interoperability Framework for Digital Finance Applications -- 1 Introduction -- 2 Background: Relevant Concepts and Definitions for the INFINITECH Semantic Interoperability Framework -- 2.1 Interoperability -- 2.1.1 Semantic Interoperability -- 2.1.2 Semantic Models -- 2.1.3 Ontologies -- 2.1.4 Semantic Annotations -- 2.2 Methodologies for Ontology Engineering -- 2.2.1 METHONTOLOGY -- 2.2.2 SAMOD -- 2.2.3 DILIGENT -- 2.2.4 UPON Lite -- 3 INFINITECH Semantic Interoperability Framework -- 3.1 Methodology for Semantic Models, Ontology Engineering, and Prototyping -- 3.1.1 Modeling Method -- 3.1.2 Envisioned Roles and Functions in Semantic Models, Ontology Engineering, and Prototyping -- 4 Applying the Methodology: Connecting the Dots -- 4.1 Workflow and Technological Tools for Validation of the Methodology -- 4.2 Collecting -- 4.3 Building and Merging -- 4.4 Refactoring and Linking -- 4.4.1 Data Ingestion -- 4.4.2 Semantic Alignment: Building and Merging -- 4.4.3 Semantic Transformation: Generating a Queryable Knowledge Graphs -- 4.4.4 Data-Sharing/Provisioning -- 5 Conclusions -- References -- Part II Blockchain Technologies and Digital Currencies for Digital Finance -- 5 Towards Optimal Technological Solutions for Central Bank Digital Currencies -- 1 Understanding CBDCs -- 1.1 A Brief History of Definitions -- 1.2 How CBDCs Differ from Other Forms of Money -- 1.3 Wholesale and Retail CBDCs -- 1.4 Motivations of CBDCs -- 1.4.1 Financial Stability and Monetary Policy -- 1.4.2 Increased Competition in Payments and Threats to Financial Sovereignty -- 2 From Motivations to Design Options -- 2.1 The Design Space of CBDCs -- 2.2 Assessing Design Space Against Desirable Characteristics. , 2.2.1 Instrument Features -- 2.2.2 System Features -- References -- 6 Historic Overview and Future Outlook of Blockchain Interoperability -- 1 Multidimensional Mutually Exclusive Choices as the Source of Blockchain Limitations -- 2 First Attempts at Interoperability -- 2.1 Anchoring -- 2.2 Pegged Sidechains -- 2.3 Cross-Chain Atomic Swaps -- 2.4 Solution Design -- 3 Later Attempts at Interoperability -- 3.1 Polkadot -- 3.2 Cosmos -- 3.3 Interledger -- 3.4 Idealistic Solution Design -- References -- 7 Efficient and Accelerated KYC Using Blockchain Technologies -- 1 Introduction -- 2 Architecture -- 3 Use Case Scenarios -- 4 Sequence Diagrams -- 5 Implementation Solution -- 6 Conclusions and Future Works -- References -- 8 Leveraging Management of Customers' Consent Exploiting the Benefits of Blockchain Technology Towards SecureData Sharing -- 1 Introduction -- 2 Consent Management for Financial Services -- 3 Related Work -- 4 Methodology -- 4.1 User's Registration -- 4.2 Customer Receives a Request to Provide New Consent for Sharing His/Her Customer Data -- 4.3 Definition of the Consent -- 4.4 Signing of the Consent by the Interested Parties -- 4.5 Consent Form Is Stored in the Consent Management System -- 4.6 Consent Update or Withdrawal -- 4.7 Expiration of the Validity Period -- 4.8 Access Control Based on the Consent Forms -- 4.9 Retrieve Complete History of Consents -- 5 The INFINITECH Consent Management System -- 5.1 Implemented Methods -- 5.1.1 Definition of Consent -- 5.1.2 Consent Update or Withdrawal -- 5.1.3 Consent Expiration -- 5.1.4 Access Control -- 5.1.5 Complete History of Consents -- 6 Conclusions -- References -- Part III Applications of Big Data and AI in Digital Finance -- 9 Addressing Risk Assessments in Real-Time for Forex Trading -- 1 Introduction -- 2 Portfolio Risk -- 3 Risk Models -- 3.1 Value at Risk. , 3.2 Expected Shortfall -- 4 Real-Time Management -- 5 Pre-trade Analysis -- 6 Architecture -- 7 Summary -- References -- 10 Next-Generation Personalized Investment Recommendations -- 1 Introduction to Investment Recommendation -- 2 Understanding the Regulatory Environment -- 3 Formalizing Financial Asset Recommendation -- 4 Data Preparation and Curation -- 4.1 Why Is Data Quality Important? -- 4.2 Data Preparation Principles -- 4.3 The INFINITECH Way Towards Data Preparation -- 5 Approaches to Investment Recommendation -- 5.1 Collaborative Filtering Recommenders -- 5.2 User Similarity Models -- 5.3 Key Performance Indicator Predictors -- 5.4 Hybrid Recommenders -- 5.5 Knowledge-Based Recommenders -- 5.6 Association Rule Mining -- 6 Investment Recommendation within INFINITECH -- 6.1 Experimental Setup -- 6.2 Investment Recommendation Suitability -- 7 Summary and Recommendations -- References -- 11 Personalized Portfolio Optimization Using Genetic(AI) Algorithms -- 1 Introduction to Robo-Advisory and Algorithm-Based Asset Management for the General Public -- 2 Traditional Portfolio Optimization Methods -- 2.1 The Modern Portfolio Theory -- 2.2 Value at Risk (VaR) -- 3 Portfolio Optimization Based on Genetic Algorithms -- 3.1 The Concept of Evolutionary Theory -- 3.2 Artificial Replication Using Genetic Algorithms -- 3.3 Genetic Algorithms for Portfolio Optimization -- 3.3.1 Multiple Input Parameters -- 3.3.2 Data Requirements -- 3.3.3 A Novel and Flexible Optimization Approach Based on Genetic Algorithms -- 3.3.4 Fitness Factors and Fitness Score -- 3.3.5 Phases of the Optimization Process Utilizing Genetic Algorithms -- 3.3.6 Algorithm Verification -- 3.3.7 Sample Use Case "Sustainability" -- 4 Summary and Conclusions -- References -- 12 Personalized Finance Management for SMEs -- 1 Introduction -- 2 Conceptual Architecture of the Proposed Approach. , 3 Datasets Used and Data Enrichment.
    Additional Edition: Print version: Soldatos, John Big Data and Artificial Intelligence in Digital Finance Cham : Springer International Publishing AG,c2022 ISBN 9783030945893
    Language: English
    Keywords: Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949892211102882
    Format: XXXII, 340 p. 69 illus., 58 illus. in color. , online resource.
    Edition: 1st ed. 2024.
    ISBN: 9783031661150
    Series Statement: Management for Professionals,
    Content: This book brings together a diverse range of findings on current and emerging business concerns when the authors were developing a series of 12 working Analytic Research Consortium (ARC) White Papers. It presents several, differently configured scenarios, drawing on cyber as an example; the use and further optimization of estimative/probabilistic language; communicating analytical insights and other findings concerning '(un)certainty' to decision-maker end-users; and mitigating risk. It also evaluates in detail today's rapidly evolving Gen-AI systems and technologies, e.g. those underlying OpenAI's ChatGPT and Google's Bard/Gemini. This includes their respective value concerning scenario development and other business-relevant methods, tools and techniques, e.g. 'Red Teaming'. The topics discussed are assessed using the multi-methodologies of, firstly, 'Intelligence Engineering' (IE) and, secondly, 'Strategic Options Analysis' (SOA). The latter half of the book introduces an alternative scenario planning process, including use of new computer-software and AI tools. In addition to Gen-AI, we identify that the emerging discipline of Causal AI may work better for foresight and scenario activities. The book is a valuable read for a diverse readership from the public and private sectors, spanning government, the military, law enforcement, education, industry, commerce, retail, and enterprises of all sizes. Also, students at business schools and high-level decision-makers, including politicians, military commanders, and C-Suite leaders in various fields, will benefit from it.
    Note: Generating Cyber Intelligence (CYBINT) scenarios & solutions to address uncertainty for decision-advantage: Using Intelligence Engineering & Strategic Options Analysis -- A Macro Cyber Scenario Case Study using Intelligence Engineering & Strategic Options Analysis Methods -- Examining the Landscape of Unauthorised Cyber Access (with reference to POSTnote #684) -- Intelligence Engineering-led set-up of generic Strategic Options Analysis Problem to Solution Spaces: Cyber example demonstration -- More than Semantics? Communication of (Un)certainty via 'Estimative/Probabilistic Language' -- Estimative/Probabilistic Language - Part II: Expanding the Range of Scenario Options -- Scoping 'Digital Twins' in intelligence & strategic foresight projects -- Generative-AI Pilot for Problem Spaces: Can ChatGPT help develop Scenarios? -- An Outline for an Interrogative/Prompt Library to help improve output quality from Generative-AI Datasets -- Prompt-engineering testing ChatGPT4 & Bard for assessing Generative-AI efficacy to support decision-making -- Can Generative-AI (ChatGPT and Bard) Be Used as Red Team Avatars in Developing Foresight Scenarios? -- Realising Foresight Intelligence (FORINT) - Advancing an Intelligence-derived Foresight Framework -- The Role of the Scenario and its Reassessment -- Advancing a New Methodological Process -- Process implications - Current software enhancements, including increasing levels of AI.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031661143
    Additional Edition: Printed edition: ISBN 9783031661167
    Additional Edition: Printed edition: ISBN 9783031661174
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9948393406702882
    Format: 1 online resource (XV, 442 p. 161 illus., 125 illus. in color.)
    Edition: 1st ed. 2020.
    ISBN: 3-030-51517-6
    Series Statement: Information Systems and Applications, incl. Internet/Web, and HCI ; 12157
    Content: This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2020, held in Hammamet, Tunisia, in June 2020.* The 17 full papers and 23 short papers presented in this volume were carefully reviewed and selected from 49 submissions. They cover topics such as: IoT and AI solutions for e-health; biomedical and health informatics; behavior and activity monitoring; behavior and activity monitoring; and wellbeing technology. *This conference was held virtually due to the COVID-19 pandemic.
    Note: IoT and AI Solutions for E-health -- Alzheimer's Disease Early Detection Using a Low Cost Three-dimensional Densenet-121 Architecture -- Self-adaptative Early Warning Scoring System for Smart Hospital -- Machine Learning Based Rank Attack Detection for Smart Hospital Infrastructure -- Remote Health Monitoring Systems Based on Bluetooth Low Energy (BLE) Communication Systems -- Modeling and Specification of Bootstrapping and Registration Design Patterns for IoT Applications -- Biomedical and Health Informatics -- EEG-based Hypo-vigilance Detection Using Convolutional Neural Network -- Respiratory Activity Classification Based on Ballistocardiogram Analysis -- A Convolutional Neural Network for Lentigo Diagnosis -- Deep Learning-based Approach for Atrial Fibrillation Detection -- Unsupervised Method Based on Superpixel Segmentation for Corpus Callosum Parcellation in MRI Scans -- Behavior and Activity Monitoring -- Using Learning Techniques to Observe Elderly's Behavior Changes Over Time -- Personalized and Contextualized Persuasion System for Older Adults’ Physical Activity Promoting -- Baseline Modelling and Composite Representation of Unobtrusively (IoT) Sensed Behaviour Changes Related to Urban Physical Well-being -- Wellbeing Technology -- Automatic Daily Activity Schedule Planning for Simulating Smart House with Elderly People Living Alone -- A Novel On-wrist Fall Detection System Using Supervised Dictionary Learning Technique -- Combined Machine Learning and Semantic Modelling for Situation Awareness and Healthcare Decision Support -- Improving Access and Mental Health for Youth Through Virtual Models of Care -- Short Contributions: IoT and AI Solutions for E-health -- Study of Middleware for Internet of Healthcare Things and Their Applications -- Uncertainty in IoT for Smart Healthcare: Challenges, and Opportunities -- Secure E-health Platform -- Hybrid and Secure E-health Data Sharing Architecture in Multi-Clouds Environment -- Blockchain for Internet of Medical Things: A technical Review -- Application of Blockchain Technology in Healthcare: A Comprehensive Study -- Trust Execution Environment and Multi-party Computation for Blockchain E-health Systems -- A Fuzzy-ontology Based Diabetes Monitoring System Using Internet of Things -- Short Contributions: Biomedical and Health Informatics -- A Hybrid Approach for Heart Disease Diagnosis and Prediction Using Machine Learning Techniques -- Context-aware Healthcare Adaptation Model for COPD Diseases -- Study of Healthcare Professionals’ Interaction in the Patient Records with Annotations -- Multirate ECG Processing and Machine Learning Based Efficient Arrhythmia Diagnosis -- Comparative Study of Relevant Methods for MRI/X Brain Image Registration -- Machine Learning Classification Models with SPD/ED Dataset: Comparative Study of Abstract Versus Full Article Approach -- Evaluation of Stationary Wavelet Transforms in Reconstruction of Pure High Frequency Oscillations (HFOs) -- Ensuring the Correctness and Well Modeling of Intelligent Healthcare Management Systems -- Short Contributions: Wellbeing Technology -- An Embedded ANN Raspberry PI for Inertial Sensor Based Human Activity Recognition -- Human Activities Recognition in Android Smartphone using WSVM-HMM Classifier -- Mobile Assistive Application for Blind People in Indoor Navigation -- Older People’s Needs and Opportunities for Assistive Technologies -- Towards a Formal Context-Aware Workflow Model for Ambient Environment -- The PULSE Project: A Case of Use of Big Data Uses Toward a Cohomprensive Health Vision of City Well Being -- ForeSight - An AI-driven Smart Living Platform, Approach to Add Access Control to openHAB. , English
    Additional Edition: ISBN 3-030-51516-8
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9949850815302882
    Format: XIII, 198 p. 34 illus., 19 illus. in color. , online resource.
    Edition: 1st ed. 2024.
    ISBN: 9789819735846
    Series Statement: Uncertainty and Operations Research,
    Content: This book systematically explores theories related to linguistic computational models and group decision making methods under uncertainty. It introduces innovative linguistic computational models capable of fusing complex linguistic information, including multi-granular linguistic information, unbalanced linguistic information and hesitant fuzzy linguistic information. Building upon the linguistic computational models, this book presents methods tailored to various types of group decision making problems under uncertainty. Additionally, it delves into group decision making problems where the personalized individual semantics of experts are considered. The book also showcases practical applications of the proposed group decision making methods, ranging from ERP system supplier selection to talent recruitment, subway line selection, and location selection for electric vehicle charging stations. By shedding light on novel models for modeling complex linguistic information and introducing new approaches to addressing linguistic group decision making challenges, this book offers valuable insights for engineers, researchers, and postgraduates interested in decision analysis, operations research, computational intelligence, management science and engineering, and related fields.
    Note: Linguistic Computational Models for Computing with Words -- Basic Linguistic Computation Models for Computing with Words -- Linguistic Computational Models for Modeling Complex Linguistic Information -- MAGDM Methods Based on Multi-granular Linguistic Information -- Consensus-based Method for MAGDM with Multi-granular Unbalanced Linguistic Information -- MALGDM Method with Multi-granular Linguistic Information -- MAGDM Methods Based on Hesitant Fuzzy Linguistic Information -- MAGDM with Multi-granular HFLTSS: A Minimum Adjustment-Based Consensus Model -- Extended TODIM for MAGDM Based on Unbalanced HFLTSS -- A Linguistic Distribution-based Approach to MALGDM with Multi-granular Unbalanced Hesitant Fuzzy Linguistic Information -- PISs-Based Linguistic GDM Methods -- Consistency and Consensus Driven Method for GDM Based on PISs -- A PISs-Based Approach to SNGDM: Managing Non-Cooperative Behavior.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9789819735839
    Additional Edition: Printed edition: ISBN 9789819735853
    Additional Edition: Printed edition: ISBN 9789819735860
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_9947364262902882
    Format: XVI, 227 p. , online resource.
    ISBN: 9783642115790
    Series Statement: Lecture Notes in Computer Science, 5951
    Content: In a dynamic computing environment, such as the Grid, resource management plays a crucial role in making distributed resources available on demand to anyone from anywhere at any time without undermining the resource autonomy; this becomes an art when dealing with heterogeneous resources distributed amongst multiple trust domains spanning the Internet. Today, Grid execution environments provide abstract workflow descriptions that need a dynamic mapping to actual deployments; this further accentuates the importance of resource management in the Grid. This monograph renders boundaries of Grid resource management, identifies research challenges and proposes new solutions with innovative techniques for on-demand provisioning, automatic deployments, dynamic synthesis, negotiation-based advance reservation and capacity planning of Grid resources. Grid capacity planning is performed with multi-constrained optimized resource allocations by modeling resource allocation as an on-line strip packing problem and introducing a new solution that optimizes resource utilization and QoS while generating contention-free solutions. The book further explains the use of semantic web technologies in the Grid to specify explicit definitions and unambiguous machine interpretable resource descriptions for intelligent resource matching and synthesis; the synthesis process generates new compound resources with aggregated capabilities and prowess. The techniques introduced have been developed and integrated in the ASKALON Grid application development and runtime environment, deployed in the Austrian Grid, and are demonstrated in this book by means of well-performed experiments.
    Note: Overview -- Model -- Brokerage -- Grid Resource Management and Brokerage System -- Grid Activity Registration, Deployment and Provisioning Framework -- Planning -- Allocation Management with Advance Reservation and Service-Level Agreement -- Optimizing Multi-Constrained Allocations with Capacity Planning -- Semantics -- Semantics in the Grid: Towards Ontology-Based Resource Provisioning -- Semantics-Based Activity Synthesis: Improving On-Demand Provisioning and Planning -- Conclusion -- Conclusion.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783642115783
    Language: English
    Subjects: Computer Science
    RVK:
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Book
    Book
    Berlin ; Heidelberg ; New York ; Barcelona u.a. :Springer,
    UID:
    almahu_BV012132456
    Format: X, 269 S. : graph. Darst.
    ISBN: 3-540-64607-8
    Series Statement: Monographs in theoretical computer science
    Note: Literaturverz. S. 257 - 263
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Formale Sprache ; Kontextfreie Grammatik ; Syntaktische Analyse ; Codegenerierung ; Transduktor ; Baumautomat
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages