SDL 2017: Model-Driven Engineering for Future Internet


Book Description

This book constitutes the proceedings of the 18th International System Design Language Forum, SDL 2017, held in Budapest, Hungary, in October 2017. The 10 full papers presented in this volume were carefully reviewed and selected from 17 submissions. The selected papers cover a wide spectrum of topics related to system design languages ranging from the system design language usage to UML and GRL models; model-driven engineering of database queries; network service design and regression testing; and modeling for Internet of Things (IoT) data processing.




Internet of Things, Threats, Landscape, and Countermeasures


Book Description

Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent. This book delves into the different cyber-security domains and their challenges due to the massive amount and the heterogeneity of devices. This book introduces readers to the inherent concepts of IoT. It offers case studies showing how IoT counteracts the cyber-security concerns for domains. It provides suggestions on how to mitigate cyber threats by compiling a catalogue of threats that currently comprise the contemporary threat landscape. It then examines different security measures that can be applied to system installations or operational environment and discusses how these measures may alter the threat exploitability level and/or the level of the technical impact. Professionals, graduate students, researchers, academicians, and institutions that are interested in acquiring knowledge in the areas of IoT and cyber-security, will find this book of interest.




Advances in Model and Data Engineering in the Digitalization Era


Book Description

This volume constitutes short papers and DETECT 2022 workshop papers, presented during the 11th International Conference on Model and Data Engineering, MEDI 2022, held in Cairo, Egypt, in November 2022. The 11 short papers presented were selected from the total of 65 submissions. This volume also contains the 4 accepted papers from the DETECT 2022 workshop, held at MEDI 2022. The volume focuses on advances in data management and modelling, including topics such as data models, data processing, database theory, database systems technology, and advanced database applications.




Tools and Technologies for the Development of Cyber-Physical Systems


Book Description

With the continual development of professional industries in today’s modernized world, certain technologies have become increasingly applicable. Cyber-physical systems, specifically, are a mechanism that has seen rapid implementation across numerous fields. This is a technology that is constantly evolving, so specialists need a handbook of research that keeps pace with the advancements and methodologies of these devices. Tools and Technologies for the Development of Cyber-Physical Systems is an essential reference source that discusses recent advancements of cyber-physical systems and its application within the health, information, and computer science industries. Featuring research on topics such as autonomous agents, power supply methods, and software assessment, this book is ideally designed for data scientists, technology developers, medical practitioners, computer engineers, researchers, academicians, and students seeking coverage on the development and various applications of cyber-physical systems.




Risks and Security of Internet and Systems


Book Description

This book constitutes the revised selected papers from the 14th International Conference on Risks and Security of Internet and Systems, CRiSIS 2019, held in Hammamet, Tunisia, in October 2019. The 20 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They cover diverse research themes that range from classic topics, such as risk analysis and management; access control and permission; secure embedded systems; network and cloud security; information security policy; data protection and machine learning for security; distributed detection system and blockchain.




Applied Data Science


Book Description

This book has two main goals: to define data science through the work of data scientists and their results, namely data products, while simultaneously providing the reader with relevant lessons learned from applied data science projects at the intersection of academia and industry. As such, it is not a replacement for a classical textbook (i.e., it does not elaborate on fundamentals of methods and principles described elsewhere), but systematically highlights the connection between theory, on the one hand, and its application in specific use cases, on the other. With these goals in mind, the book is divided into three parts: Part I pays tribute to the interdisciplinary nature of data science and provides a common understanding of data science terminology for readers with different backgrounds. These six chapters are geared towards drawing a consistent picture of data science and were predominantly written by the editors themselves. Part II then broadens the spectrum by presenting views and insights from diverse authors – some from academia and some from industry, ranging from financial to health and from manufacturing to e-commerce. Each of these chapters describes a fundamental principle, method or tool in data science by analyzing specific use cases and drawing concrete conclusions from them. The case studies presented, and the methods and tools applied, represent the nuts and bolts of data science. Finally, Part III was again written from the perspective of the editors and summarizes the lessons learned that have been distilled from the case studies in Part II. The section can be viewed as a meta-study on data science across a broad range of domains, viewpoints and fields. Moreover, it provides answers to the question of what the mission-critical factors for success in different data science undertakings are. The book targets professionals as well as students of data science: first, practicing data scientists in industry and academia who want to broaden their scope and expand their knowledge by drawing on the authors’ combined experience. Second, decision makers in businesses who face the challenge of creating or implementing a data-driven strategy and who want to learn from success stories spanning a range of industries. Third, students of data science who want to understand both the theoretical and practical aspects of data science, vetted by real-world case studies at the intersection of academia and industry.




Computer and Cyber Security


Book Description

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.




Radical Solutions for Education in Africa


Book Description

This book explores the state of open education in terms of self-directed learning on the African continent. Through a combination of conceptual, systematic literature review and empirical chapters, readers will get a research-based impression of these aspects in this area. Apart from presenting existing wider trends regarding open education, this book also reports on effective open practices in support of self-directed learning.




Successfully Implementing Problem-Based Learning in Classrooms


Book Description

Problem-based learning (PBL) represents a widely recommended best practice that facilitates both student engagement with challenging content and students' ability to utilize that content in a more flexible manner to support problem-solving. This edited volume includes research that focuses on examples of successful models and strategies for facilitating preservice and practicing teachers in implementing PBL practices in their current and future classrooms in a variety of K-12 settings and in content areas ranging from the humanities to the STEM disciplines. This collection grew out of a special issue of the Interdisciplinary Journal of Problem-Based Learning. It includes additional research and models of successful PBL implementation in K-12 teacher education and classroom settings.




Advances in Computing and Data Sciences


Book Description

This book constitutes the refereed proceedings of the 7th International Conference on Advances in Computing and Data Sciences, ICACDS 2023, held in Kolkata, India, during April 27–28, 2023. The 47 full papers included in this book were carefully reviewed and selected from 22 submissions. The papers focus on advances of next generation computing technologies in the areas of advanced computing and data sciences.