This book describes methodologies for developing semantic applications. Semantic applications are software applications which explicitly or implicitly use the semantics, i.e. the meaning of a domain terminology, in order to improve usability, correctness, and completeness. An example is semantic search, where synonyms and related terms are used for enriching the results of a simple text-based search. Ontologies, thesauri or controlled vocabularies are the centerpiece of semantic applications. The book includes technological and architectural best practices for corporate use. The authors are experts from industry and academia with experience in developing semantic applications.
This book covers the proceedings from the 2016 International Symposium on Chaos, Complexity and Leadership, and reflects current research results of chaos and complexity studies and their applications in various fields. Included are research papers in the fields of applied nonlinear methods, modeling of data and simulations, as well as theoretical achievements of chaos and complex systems. Also discussed are leadership and management applications of chaos and complexity theory.
Discover the Django web application framework and get started building Python-based web applications. This book takes you from the basics of Django all the way through to cutting-edge topics such as creating RESTful applications. Beginning Django also covers ancillary, but essential, development topics, including configuration settings, static resource management, logging, debugging, and email. Along with material on data access with SQL queries, you´ll have all you need to get up and running with Django 1.11 LTS, which is compatible with Python 2 and Python 3. Once you´ve built your web application, you´ll need to be the admin, so the next part of the book covers how to enforce permission management with users and groups. This technique allows you to restrict access to URLs and content, giving you total control of your data. In addition, you´ll work with and customize the Django admin site, which provides access to a Django project´s data. After reading and using this book, you´ll be able to build a Django application top to bottom and be ready to move on to more advanced or complex Django application development. What You´ll Learn Get started with the Django framework Use Django views, class-based views, URLs, middleware, forms, templates, and Jinja templates Take advantage of Django models, including model relationships, migrations, queries, and forms Leverage the Django admin site to get access to the database used by a Django project Deploy Django REST services to serve as the data backbone for mobile, IoT, and SaaS systems Who This Book Is For Python developers new to the Django web application development framework and web developers new to Python and Django.
Push your GameMaker programming skills to the edge with 100 programming challenges using the popular GameMaker: Studio and GML. Each challenge includes an outline of the challenge, a scoring and time guide, useful GML code, and a working example provided in GMZ format. For more advanced programmers, each challenge comes with an additional task to complete. Think you´re a good GameMaker game application developer or programmer? Think again with this awesome book! What You´ll Learn Upgrade your skills with each specific game application coding challenge Create many different game events, action or scenarios Code for many different kinds of game applications or themes from space to adventure to sports to fantasy Who This Book Is For GameMaker and GameMaker: Studio users and coders.
Master the Java EE 8 and JSF (JavaServer Faces) APIs and web framework with this practical, projects-driven guide to web development. This book combines theoretical background with a practical approach by building four real-world applications. By developing these JSF web applications, you´ll take a tour through the other Java EE technologies such as JPA, CDI, Security, WebSockets, and more. In Practical JSF in Java EE 8 , you will learn to use the JavaServer Faces web framework in Java EE 8 to easily construct a web-based user interface from a set of reusable components. Next, you add JSF event handling and then link to a database, persist data, and add security and the other bells and whistles that the Java EE 8 platform has to offer. After reading this book you will have a good foundation in Java-based web development and will have increased your proficiency in sophisticated Java EE 8 web development using the JSF framework. What You Will Learn Use the Java EE 8 and the JavaServer Faces APIs to build Java-based web applications through four practical real-world case studies Process user input with JSF and the expression language by building a calculator application Persist data using JSF templating and Java Persistence to manage an inventory of books Create and manage an alumni database using JSF, Ajax, web services and Java EE 8´s security features. Who This Book Is For Those new to Java EE 8 and JSF. Some prior experience with Java is recommended.
Learn the basics of serverless computing and how to develop event-driven architectures with the three major cloud platforms: Amazon Web Services, Microsoft Azure, and Google Cloud. This hands-on guide dives into the foundations of serverless computing, its use cases, and how to apply it using developer tools such as Node.js, Visual Studio Code, Postman, and Serverless Framework. You will apply the fundamentals of serverless technology from the ground up, and come away with a greater understanding of its power and how to make it work for you. This book teaches you how to quickly and securely develop applications without the hassle of configuring and maintaining infrastructure. You will learn how to harness serverless technology to rapidly reduce production time and minimize your costs, while still having the freedom to customize your code, without hindering functionality. Upon completion, you will have the knowledge and resources to build your own serverless application hosted in AWS, Azure, or Google Cloud and will have experienced the benefits of event-driven technology for yourself. What You´ll Learn Gain a deeper understanding of serverless computing and when to use it Use development tools such as Node.js, Postman, and VS code to quickly set up your serverless development environment and produce applications Apply triggers to your serverless functions that best suit the architecture for the problem the functions are solving Begin building applications across cloud providers that utilize the power of serverless technology Understand best development practices with serverless computing to maintain scalable and practical solutions Code with an agnostic approach to cloud providers to minimize provider dependency Who This Book Is For Any developer looking to expand current knowledge of serverless computing, its applications, and how to architect serverless solutions, or someone just beginning in these areas
This book comprehensively covers the topic of recommender systems, which provide personalized recommendations of products or services to users based on their previous searches or purchases. Recommender system methods have been adapted to diverse applications including query log mining, social networking, news recommendations, and computational advertising. This book synthesizes both fundamental and advanced topics of a research area that has now reached maturity. The chapters of this book are organized into three categories: Algorithms and evaluation: These chapters discuss the fundamental algorithms in recommender systems, including collaborative filtering methods, content-based methods, knowledge-based methods, ensemble-based methods, and evaluation. Recommendations in specific domains and contexts: the context of a recommendation can be viewed as important side information that affects the recommendation goals. Different types of context such as temporal data, spatial data, social data, tagging data, and trustworthiness are explored. Advanced topics and applications: Various robustness aspects of recommender systems, such as shilling systems, attack models, and their defenses are discussed. In addition, recent topics, such as learning to rank, multi-armed bandits, group systems, multi-criteria systems, and active learning systems, are introduced together with applications. Although this book primarily serves as a textbook, it will also appeal to industrial practitioners and researchers due to its focus on applications and references. Numerous examples and exercises have been provided, and a solution manual is available for instructors.
This book focuses on video-based, corneal-reflection eye trackers - the most widely available and affordable type of system, and takes a look at a number of interesting and challenging applications in human factors, collaborative systems, virtual reality, marketing and advertising. The third edition has been extensively revised and extended, and includes new chapters on calibration accuracy, precision and correction; advanced eye movement analysis; binocular eye movement analysis; practical gaze analytics; design; GIS. Opening with useful background information, including an introduction to the human visual system and key issues in visual perception and eye movement, the author then surveys eye-tracking devices and provides a detailed introduction to the technical requirements necessary for installing a system and developing an application program.
In the latest years, the use of computational techniques for solving different problems is rising. In this context, engineers are faced with the difficult choice of selecting and applying the best methods suited for modelling and optimization purposes. On the other hand, there are cases when the conventional approaches are not feasible and alternative methods must be developed. This book is aimed to help engineers in the application and implementation of neural networks and bio-inspired algorithms for solving day-to-day engineering problems and specific process optimization. New techniques based on artificial neural networks, differential evolution algorithm, and artificial immune systems are presented. They have proven to be flexible and efficient, having as main advantages the generalization capability and the opportunity of providing useful information for experimental practice.
The Manga Guide to Cryptography breaks down how ciphers work, what makes them secure or insecure, and how to decode them. Comic illustrations make it easy to learn about classic substitution, polyalphabetic, and transposition ciphers; symmetric-key algorithms like block and DES (Data Encryption Standard) ciphers; how to use public key encryption technology to generate public/private keys and cryptograms; practical applications of encryption such as digital signatures, identity fraud countermeasures, and ´man in the middle´ attack countermeasures.