Selected peer-reviewed extended articles based on abstracts presented at the 4th International Scientific Conference of Alkafeel University (ISCKU2022) Aggregated Book
This book constitutes the Revised Selected Papers of the Second International Conference, ICAETA 2023, held in Istanbul, Turkey, during March 10–11, 2023. The 37 full papers included in this volume were carefully reviewed and selected from 139 submissions. The topics cover a range of areas related to engineering, technology, and applications. Main themes of the conference include, but are not limited to: Data Analysis, Visualization and Applications; Artificial Intelligence, Machine Learning and Computer Vision; Computer Communication and Networks; Signal Processing and Applications; Electronic Circuits, Devices, and Photonics; Power Electronics and Energy Systems.
The text emphasizes the need for data pre-processing, classification and prediction, cluster analysis, mining multimedia, and advanced machine learning techniques for scientific programming in Industry 5.0. • Addresses how the convergence of intelligent systems and 5G wireless systems will solve industrial problems such as autonomous robots, and self-driving cars. • Highlights the methods of smart things in collaborative autonomous fleets and platforms for integrating applications across different business and industry domains. • Discusses important topics such as the Internet of robotic things, cloud robotics, and cognitive architecture for cyber-physical robotics. • Explains image compression, and advanced machine learning techniques for scientific programming in Industry 5.0. • Presents a detailed discussion of smart manufacturing techniques, industrial Internet of things, and supply chain management in Industry 5.0. The text is primarily written for graduate students and academic researchers in the fields of industrial engineering, manufacturing engineering, electrical engineering, production engineering, and mechanical engineering.
The International Conference on Communications, Management, and Information Technology (ICCMIT’16) provides a discussion forum for scientists, engineers, educators and students about the latest discoveries and realizations in the foundations, theory, models and applications of systems inspired on nature, using computational intelligence methodologies, as well as in emerging areas related to the three tracks of the conference: Communication Engineering, Knowledge, and Information Technology. The best 25 papers to be included in the book will be carefully reviewed and selected from numerous submissions, then revised and expanded to provide deeper insight into trends shaping future ICT.
"The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." —Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security—one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." —Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." —Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." —Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes—resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools—including Sguil, Argus, and Ethereal—to mine network traffic for full content, session, statistical, and alert data. Best practices for conducting emergency NSM in an incident response scenario, evaluating monitoring vendors, and deploying an NSM architecture. Developing and applying knowledge of weapons, tactics, telecommunications, system administration, scripting, and programming for NSM. The best tools for generating arbitrary packets, exploiting flaws, manipulating traffic, and conducting reconnaissance. Whether you are new to network intrusion detection and incident response, or a computer-security veteran, this book will enable you to quickly develop and apply the skills needed to detect, prevent, and respond to new and emerging threats.
In Strategic Management: Theory and Practice, Fourth Edition, John A. Parnell leads readers through detailed, accessible coverage of the strategic management field. Concise and easy to understand chapters address concepts sequentially, from external and internal analysis to strategy formulation, strategy execution, and strategic control. Rather than relegating case analysis to a chapter at the end of the book, Parnell aligns each chapter's key concepts with 25 case analysis steps. Current examples and high interest real-time cases, largely drawn from The Wall Street Journal and Financial Times, illustrate the key role of strategic management in the United States and around the world.
This Pocket Guide provides a concise explanation of the nature, content and aim of ISO/IEC 20000-1: 2011 and a short summary of ISO/IEC 20000-2:2012. It brings ISO/IEC20000 Part 1 and Part 2 within reach of a vast international audience by providing the key elements of this important standard in a short, easy to read format: it promote the awareness and the acceptability of ISO/IEC 20000 Part 1 and Part 2 as a valid standard for IT Services organizations; it supports ISO/IEC 20000 training and certification and it is a quick reference for practitioners to the core content of ISO/IEC 20000.
In the last decade, due to factors of ICT infrastructural and broadband maturation, rising levels of educational attainment and computer literacy, and diversification strategies, e-learning has exploded in the Middle East and North Africa (MENA) region. However, significant barriers remain in the region’s e-learning development: lack of research on outcomes and effectiveness, paucity of Arabic language learning objects, monopolies and high cost of telecommunications, cultural taboos, accreditation, censorship, and teacher training. This unique volume is the first comprehensive effort to describe the history, development, and current state of e-learning in each of the 20 MENA countries from Algeria to Yemen. Each entry is expertly written by a specialist who is acutely familiar with the state of e-learning in their respective country, and concludes with a bibliography of key reports, peer-reviewed books and articles, and web resources. E-Learning in the Middle East and North Africa (MENA) proves itself as a vital compendium for a wide readership that includes academics and students, transnational program directors, international education experts, MENA government departments, commercial vendors and investors, and ICT development and regulatory agencies involved in e-learning in the Middle East.
The book presents high-quality papers from the Fourth International Conference on Microelectronics and Telecommunication Engineering (ICMETE 2021). It discusses the latest technological trends and advances in major research areas such as microelectronics, wireless communications, optical communication, signal processing, image processing, big data, cloud computing, artificial intelligence and sensor network applications. This book includes the contributions of national and international scientists, researchers, and engineers from both academia and the industry. The contents of this volume will be useful to researchers, professionals, and students alike.