LEADER 02257nam 2200529 450 001 9910818982503321 005 20180613001253.0 010 $a0-8218-9961-9 035 $a(CKB)3360000000463965 035 $a(EBL)3113469 035 $a(SSID)ssj0000973427 035 $a(PQKBManifestationID)11616161 035 $a(PQKBTitleCode)TC0000973427 035 $a(PQKBWorkID)10959426 035 $a(PQKB)11719258 035 $a(MiAaPQ)EBC3113469 035 $a(RPAM)0000000634 035 $a(PPN)195408853 035 $a(EXLCZ)993360000000463965 100 $a19800221h19511951 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aOn the automorphisms of the classical groups /$fJean Dieudonne? ; with a supplement by Loo-Keng Hua 210 1$aNew York :$cAmerican Mathematical Society,$d[1951] 210 4$dİ1951 215 $a1 online resource (130 p.) 225 1 $aMemoirs of the American Mathematical Society,$x0065-9266 ;$vnumber 2 300 $aDescription based upon print version of record. 311 $a0-8218-1202-5 320 $aIncludes bibliographical references. 327 $a""24. Determination of the automorphisms of PSp[sub(n)](K)""""VIII. AUTOMORPHISMS OF Sp[sub(2m)](K) (K field of characteristic 2)""; ""25. Centralizers of involutions in Sp[sub(2m)](K)""; ""26. Group-theoretic characterization of symplectic tranavections""; ""27. The case n=4""; ""28. Determination of the automorphisms of Sp[sub(n)](K)""; ""29. Isomorphisms between PSp[sub(2m)](K) and PSp[sub(2q)](K')""; ""IX. ISOMORPHISMS BETWEEN THE GROUPS PSp[sub(2m)](K) AND THE GROUPS PSL[sub(n)](K') AND V[sub(r)]""; ""30. Isomorphisms between the groups PSp[sub(2m)](K) and PSL[sub(n)]K')"" 327 $a""37. Second case : n even (continued)"" 410 0$aMemoirs of the American Mathematical Society ;$vnumber 2. 606 $aGroup theory 615 0$aGroup theory. 700 $aDieudonne?$b Jean$f1906-1992,$0345747 702 $aHua$b Loo-Keng$f1911- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910818982503321 996 $aOn the Automorphisms of the Classical Groups$9353514 997 $aUNINA LEADER 11821nam 22006853 450 001 9911020125003321 005 20250519110025.0 010 $a9781394197750 010 $a1394197756 010 $a9781394197736 010 $a139419773X 010 $a9781394197743 010 $a1394197748 024 8 $aCIPO000216524 035 $a(MiAaPQ)EBC31959435 035 $a(Au-PeEL)EBL31959435 035 $a(CKB)37847436600041 035 $a(OCoLC)1507846064 035 $a(CaSebORM)9781394197712 035 $a(OCoLC)1509166851 035 $a(OCoLC-P)1509166851 035 $a(EXLCZ)9937847436600041 100 $a20250316d2025 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber-Physical Systems for Innovating and Transforming Society 5. 0 205 $a1st ed. 210 1$aNewark :$cJohn Wiley & Sons, Incorporated,$d2025. 210 4$dİ2025. 215 $a1 online resource (277 pages) 225 1 $aArtificial Intelligence and Soft Computing for Industrial Transformation Series 311 08$a9781394197712 311 08$a1394197713 327 $aCover -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgement -- Chapter 1 Revolutionizing Legal Operations: Benefits and Best Practices of Cyber-Physical Systems in Society 5.0 -- 1.1 Introduction -- 1.1.1 Cyber-Physical System -- 1.1.2 CPS Usage in the Legal Field -- 1.2 Benefits of CPS in the Legal Field -- 1.2.1 Increased Efficiency -- 1.2.2 Enhanced Security -- 1.2.3 Improved Collaboration -- 1.2.4 Predictive Analytics -- 1.3 Applications of CPS in the Legal Field -- 1.3.1 Case Management -- 1.3.2 Contract Management -- 1.3.3 Document Management -- 1.3.4 Legal Research -- 1.3.5 Litigation Support -- 1.4 Challenges of Implementing CPS in the Legal Field -- 1.4.1 Resistance to Change -- 1.4.2 Cost of Implementation -- 1.4.3 Security Concerns -- 1.4.4 Complexity of Integration -- 1.5 Best Practices for Implementing CPS in the Legal Field -- 1.5.1 Understanding the Business Case for CPS -- 1.5.2 Assess the Technology Panorama -- 1.5.3 Develop a Comprehensive Implementation Plan -- 1.5.4 Ensure Statistics' Privacy and Security -- 1.5.5 Provide Adequate Schooling and Support -- 1.6 Examples of Successful CPS Implementation within the Legal Field -- 1.6.1 Law Firms -- 1.6.2 Corporate Legal Departments -- 1.6.3 Legal Technology Companies -- 1.7 Future of CPS -- 1.7.1 Potential for In-Addition Integration with Different Rising Technology -- 1.7.2 Potential for Extra Performance and Cost Savings -- 1.7.3 Potential for Extended Accuracy and Effectiveness of Criminal Methods -- 1.8 Conclusion -- 1.8.1 Recap of Benefits and Challenges of CPS in the Legal Field -- 1.8.2 Future Outlook for CPS Inside the Legal Subject -- 1.8.3 Way Forward -- References -- Chapter 2 Integrating Predictive Capabilities and Voice Biometric Authentication in Voice Assistants -- 2.1 Introduction -- 2.2 Literature Review. 327 $a2.3 Methodology -- 2.4 Discussion and Result -- 2.4.1 Limitations -- 2.5 Conclusion and Future Scope -- References -- Chapter 3 Leveraging Cloud Computing in Cyber-Physical Systems for Innovative Society 5.0 -- 3.1 Introduction -- 3.2 Scope and Objective -- 3.3 Overview -- 3.4 Layers of Metaverse -- 3.5 Social and Technological Challenges -- 3.6 Evolution -- 3.7 Social and Cultural Implications -- 3.8 Limitation -- 3.9 Conclusion -- References -- Chapter 4 Drone Management System to Detect Fire and Potholes on the Road Towards Smart City -- 4.1 Introduction -- 4.1.1 Management Mechanism -- 4.1.2 Pothole Detection -- 4.1.3 Fire Detection -- 4.2 Proposed Methodology -- 4.2.1 Acquisition of the Dataset -- 4.2.1.1 Deep Learning Model for Pothole and Fire Detection -- 4.2.2 Family YOLO -- 4.2.3 YOLO V5 -- 4.2.3.1 Framework Used -- 4.2.3.2 Benefits of YOLOv5 -- 4.3 Experimentation and Results -- 4.3.1 Data Annotations -- 4.3.2 Test Systems -- 4.3.3 Performance Metrics -- 4.3.3.1 Performance with Pothole Dataset Using YOLOv5 -- 4.3.3.2 Performance with Fire Dataset Using YOLOv5x -- 4.4 Conclusion -- References -- Chapter 5 A Comprehensive Approach to Cybersecurity and Healthcare Systems Using Artificial Intelligence and Robotics -- 5.1 Introduction -- 5.1.1 Hypothesis -- 5.1.1.1 What are the General Problems in Cybersecurity? -- 5.1.1.2 What are the General Problems in Healthcare? -- 5.1.1.3 What is the Significance of AI and the Field of Robotics? -- 5.1.1.4 What are the Challenges of AI in Cybersecurity and Healthcare and How can these be Overcome? -- 5.1.1.5 What is the Current State of Research in AI in Terms of Cybersecurity and Healthcare? -- 5.1.1.6 What is the Future of AI from a Cybersecurity and Healthcare Perspective? -- 5.2 Methodology -- 5.2.1 Applications of AI in Cybersecurity Defense -- 5.2.2 Applications of AI in Healthcare. 327 $a5.2.3 Data Source -- 5.2.4 Exploration Criteria -- 5.2.5 Artificial Intelligence and Robotics -- 5.2.5.1 Characteristics of Artificial Intelligence -- 5.2.5.2 The Robotics Field -- 5.3 Conclusion -- 5.4 Future Direction -- References -- Chapter 6 Nonlinear Power Law Modeling for Test Vehicle Structural Response -- 6.1 Introduction -- 6.2 Theory -- 6.2.1 Linear Closure Phase Force-Deflection Model -- 6.2.2 Power Law Closure Phase Force-Deflection Model -- 6.2.3 Linear Separation Phase Force-Deflection Model -- 6.2.4 Power Separation Phase Force-Deflection Model -- 6.2.5 Power Law Kinematic Response -- 6.3 Methods and Materials -- 6.4 Results -- 6.5 Discussion -- References -- Chapter 7 Key Matrix Generation Techniques for Hill Cipher Cryptosystem - A Comparative Study -- 7.1 Introduction -- 7.2 Literature Review -- 7.3 Hill Cipher -- 7.4 Key Generation Methods for Hill Cipher -- 7.4.1 Magic Rectangle Method for the Generation of Key Matrix for Hill Cipher -- 7.4.2 A Generation of Self-Invertible Matrix for Hill Cipher Algorithm -- 7.4.3 A Generation of Self-Invertible Matrix Using Generic Approach -- 7.4.4 Alternate Approach for a Generation of Self-Invertible Matrix -- 7.5 Methodology for Comparative Study -- 7.5.1 Background and Overview -- 7.5.2 Security Aspect -- 7.5.3 Quality of the Techniques -- 7.5.4 Implementation Ease -- 7.5.5 Limitations -- 7.6 Conclusion and Future Prospects -- References -- Chapter 8 Machine Learning-Based Spotify Song Prediction -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Methodology -- 8.4 Experimental Results -- 8.4.1 Task 1: Time Series Analysis -- 8.4.2 Task 2: Recommended Artists -- 8.4.3 Task 3: Popularity Rating -- 8.4.4 Task 4: Differentiate Genres -- 8.5 Conclusion -- References -- Chapter 9 Artificial Intelligence and Sentiment Analysis in Political Campaigns -- 9.1 Introduction. 327 $a9.2 Artificial Intelligence and Sentiment Analysis in Modern Politics -- 9.3 Artificial Intelligence: A Catalyst for Political Transformation -- 9.4 Sentiment Analysis: Deciphering the Public Pulse -- 9.5 Applications AI and Sentiment Analysis in Modern Politics -- 9.6 Ethical Considerations -- 9.7 Artificial Intelligence in Political Campaigns -- 9.8 Use of Sentiment Analysis in Political Campaigns -- 9.9 Interrelated Variable Matrix for AI and Sentiment Analysis in Modern Politics -- 9.10 Cambridge Analytica: Data Scandal of Digital Politics -- 9.11 Digital Politics -- 9.12 Conclusion -- References -- Chapter 10 Digital Platforms and Leveraging Technologies to Enhance Learner Engagement -- 10.1 Introduction -- 10.2 Personalized Instruction and Adaptive Learning -- 10.3 Interactive Learning Experiences -- 10.4 Leveraging Technology: Inclusivity and Access to Education -- 10.5 Seamless Learning -- 10.6 Ethical Considerations and Digital Citizenship -- 10.7 Conclusion -- References -- Chapter 11 Disruptive Technologies in Cyber-Physical Systems in War -- 11.1 Introduction -- 11.2 Cyber-Physical Systems in Modern Warfare -- 11.2.1 Exploring Cyber-Physical Systems: Definition and Key Characteristics -- 11.2.2 Integration of CPS in Military Operations -- 11.2.3 Cyber-Physical Systems in Achieving Operational Objectives -- 11.3 Artificial Intelligence in Cyber-Physical Systems -- 11.3.1 Autonomous Weapon Systems and AI-Driven Decision-Making -- 11.3.2 Artificial Intelligence for Predictive Analysis and Situational Awareness -- 11.3.3 Ethical and Legal Implications of AI in Warfare -- 11.4 Autonomous Systems and Robotics -- 11.4.1 Drones and Unmanned Aerial Vehicles (UAVs) -- 11.4.2 Ground and Sea-Based Autonomous Systems -- 11.4.3 Challenges Faced in Deploying Autonomous Systems -- 11.5 Fifth Generation (5G) Technology and Network-Centric Warfare. 327 $a11.5.1 High-Speed Data Transmission for Military Applications -- 11.5.2 Enhanced Connectivity and Communication in the Battlefield -- 11.5.3 Security Implications and Countermeasures in 5G Networks -- 11.6 Regulatory Frameworks for CPS Warfare -- 11.6.1 International Agreements on the Use of Disruptive Technologies -- 11.6.2 Establishing Norms and Standards for CPS in Warfare -- 11.6.3 Balancing the New Innovations with Ethical and Legal Considerations -- References -- Index -- Also of Interest -- EULA. 330 $aThe book presents a suite of innovative tools to reshape society into an interconnected future where technology empowers humans to efficiently resolve pressing socio-economic issues while fostering inclusive growth. This book introduces a spectrum of pioneering advancements across various sectors within Society 5.0, all underpinned by cutting-edge technological innovations. It aims to deliver an exhaustive collection of contemporary concepts, practical applications, and groundbreaking implementations that have the potential to enhance diverse areas of society. Society 5.0 signifies human advancement and is distinguished by its unique synthesis of cyberspace with physical space. This integration harnesses data gathered via environmental sensors, processed by artificial intelligence, to enhance real-world interactions. This volume encompasses an extensive array of scholarly works with detailed insights into fields such as image processing, natural language processing, computer vision, sentiment analysis, and analyses based on voice and gestures. The content presented will be beneficial to multiple disciplines, including the legal system, medical systems, intelligent societal constructs, integrated cyber-physical systems, and innovative agricultural practices. In summary, Cyber-Physical Systems for Innovating and Transforming Society 5.0 presents a suite of innovative tools to reshape society into an interconnected future where technology empowers humans to efficiently resolve pressing socio-economic issues while fostering inclusive growth. Audience The book will be beneficial to researchers, engineers, and students in multiple disciplines, including the legal system, medical systems, intelligent societal constructs, integrated cyber-physical systems, and innovative agricultural practices. 410 0$aArtificial Intelligence and Soft Computing for Industrial Transformation Series 606 $aCooperating objects (Computer systems) 606 $aTechnology$xSocial aspects 615 0$aCooperating objects (Computer systems) 615 0$aTechnology$xSocial aspects. 676 $a303.48/3 700 $aChoudhury$b Tanupriya$01423894 701 $aKumar$b Abhijit$01838026 701 $aTomar$b Ravi$01427077 701 $aBalamurugan$b S$01751055 701 $aVishnoi$b Ankit$01838027 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911020125003321 996 $aCyber-Physical Systems for Innovating and Transforming Society 5. 0$94416918 997 $aUNINA