Browse Results

Showing 30,351 through 30,375 of 54,344 results

Connectivity of Communication Networks

by Guoqiang Mao

This book introduces a number of recent developments on connectivity of communication networks, ranging from connectivity of large static networks and connectivity of highly dynamic networks to connectivity of small to medium sized networks. This book also introduces some applications of connectivity studies in network optimization, in network localization, and in estimating distances between nodes. The book starts with an overview of the fundamental concepts, models, tools, and methodologies used for connectivity studies. The rest of the chapters are divided into four parts: connectivity of large static networks, connectivity of highly dynamic networks, connectivity of small to medium sized networks, and applications of connectivity studies.

Data Science: 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part II (Communications in Computer and Information Science #1059)

by Rui Mao Hongzhi Wang Xiaolan Xie Zeguang Lu

This two volume set (CCIS 1058 and 1059) constitutes the refereed proceedings of the 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019 held in Guilin, China, in September 2019. The 104 revised full papers presented in these two volumes were carefully reviewed and selected from 395 submissions. The papers cover a wide range of topics related to basic theory and techniques for data science including data mining; data base; net work; security; machine learning; bioinformatics; natural language processing; software engineering; graphic images; system; education; application.

Video over Cognitive Radio Networks

by Shiwen Mao

This book focuses on the problem of video streaming over emerging cognitive radio (CR) networks. The book discusses the problems and techniques for scalable video streaming over cellular cognitive radio networks, ad hoc CR networks, cooperative CR networks, and femtocell CR networks. The authors formulate these problems and propose optimal algorithms to solve these problems. Also the book analyzes the proposed algorithms and validates the algorithms with simulations.

Wireless Internet: 10th International Conference, Wicon 2017, Tianjin, China, December 16-17, 2017, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #230)

by Shiwen Mao Cheng Li

This book constitutes the refereed post-conference proceedings of the 10th International Conference on Wireless Internet , WiCON 2017, held in Tianjin, China, in December 2017. The 42 full papers were selected from 70 submissions and cover the following topics: wireless networking, massive MIMO and mmWave, WSNs and VANETs, security and IoT, wireless communications, cloud and big data networking.

Generative Adversarial Networks for Image Generation

by Xudong Mao Qing Li

Generative adversarial networks (GANs) were introduced by Ian Goodfellow and his co-authors including Yoshua Bengio in 2014, and were to referred by Yann Lecun (Facebook’s AI research director) as “the most interesting idea in the last 10 years in ML.” GANs’ potential is huge, because they can learn to mimic any distribution of data, which means they can be taught to create worlds similar to our own in any domain: images, music, speech, prose. They are robot artists in a sense, and their output is remarkable – poignant even. In 2018, Christie’s sold a portrait that had been generated by a GAN for $432,000. Although image generation has been challenging, GAN image generation has proved to be very successful and impressive. However, there are two remaining challenges for GAN image generation: the quality of the generated image and the training stability. This book first provides an overview of GANs, and then discusses the task of image generation and the details of GAN image generation. It also investigates a number of approaches to address the two remaining challenges for GAN image generation. Additionally, it explores three promising applications of GANs, including image-to-image translation, unsupervised domain adaptation and GANs for security. This book appeals to students and researchers who are interested in GANs, image generation and general machine learning and computer vision.

Model Validation and Uncertainty Quantification, Volume 3: Proceedings of the 38th IMAC, A Conference and Exposition on Structural Dynamics 2020 (Conference Proceedings of the Society for Experimental Mechanics Series)

by Zhu Mao

Model Validation and Uncertainty Quantification, Volume 3: Proceedings of the 38th IMAC, A Conference and Exposition on Structural Dynamics, 2020, the third volume of nine from the Conference brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on fundamental and applied aspects of Model Validation and Uncertainty Quantification, including papers on:Uncertainty Quantification in Material ModelsUncertainty Propagation in Structural DynamicsPractical Applications of MVUQAdvances in Model Validation & Uncertainty Quantification: Model UpdatingModel Validation & Uncertainty Quantification: Industrial ApplicationsControlling UncertaintyUncertainty in Early Stage DesignModeling of Musical InstrumentsOverview of Model Validation and Uncertainty

AI, Ethics, and Discrimination in Business: The DEI Implications of Algorithmic Decision-Making (Palgrave Studies in Equity, Diversity, Inclusion, and Indigenization in Business)

by Marco Marabelli

This book takes a historical approach to explore data, algorithms, their use in practice through applications of AI in various settings, and all of the surrounding ethical and DEI implications. Summarizing our current knowledge and highlighting gaps, it offers original examples from empirical research in various settings, such as healthcare, social media, and the GIG economy.The author investigates how systems relying on a binary structure (machines) work in systems that are instead analogic (societies). Further, he examines how underrepresented populations, who have been historically penalized by technologies, can play an active role in the design of automated systems, with a specific focus on the US legal and social system.One issue is that main tasks of machines concern classification, which, while efficient for speeding up decision-making processes, are inherently biased. Ultimately, this work advocates for ethical design and responsible implementation and deployment of technology in organizations and society through through government-sponsored social justice, in contrast with free market policies.This interdisciplinary text contributes to the timely and relevant debate on algorithmic fairness, biases, and potential discriminations. It will appeal to researchers in business ethics and information systems while building on theories from anthropology, psychology, sociology, management, marketing, and economics.

Fake news: Cómo se fabrican en la Argentina y en el mundo

by Julián Maradeo

A partir de casos locales y del mundo, el libro cuenta la historia de las noticias falsas, de cómo nos ponen en estado de alerta y, al mismo tiempo, refleja la debilidad estatal, la falta de control y el enorme lobby alrededor de ellas. La imagen de una chica con su bebé en brazos mientras carga en la espalda una caja térmica de delivery es la punta del iceberg de un fenómeno que sacudió las nociones de verdad y mentira: las fake news. Todos estamos expuestos y a la vez las reproducimos hasta convertirlas en pandémicas. Sus consecuencias pueden alterar elecciones, decisiones de gobierno e incluso provocar muertes. A partir de casos locales y del mundo, el libro cuenta la historia de las noticias falsas, de cómo nos ponen en estado de alerta y, al mismo tiempo, reflejan la debilidad estatal, la falta de control y el enorme lobby alrededor de ellas. «Esta investigación -dice Julián Maradeo- trata sobre otra forma de ejercer el poder. Una que es imperceptible, escurridiza, placentera y extraterritorial. Una que jaquea a todas las teorías que discurrieron por siglos al respecto. Una en la que interviene un lenguaje que resulta ajeno, sujetos que parecen salidos de una película, geografías remotas. Una que pone en entredicho las reglas del juego democrático. Las noticias falsas no discriminan entre Oriente y Occidente, afectan a todos sin mirar a quién».

Mastering Bootstrap 4

by Jason Marah Benjamin Jakobus

Learn how to build beautiful and highly customizable web interfaces by leveraging the power of Bootstrap 4 About This Book * Adapt and customize Bootstrap to produce enticing websites that fit your needs * Explore Bootstrap's grid system, helper classes, and responsive utilities * Extend Bootstrap with jQuery plugins and learn how to create your own custom plugins Who This Book Is For This book targets intermediate-level front-end web-developers. The book is not intended to be an introduction to web development. As such, the book assumes that readers have a firm grasp on the basic concepts behind web-development, as well as essential HTML, JavaScript and CSS skills. What You Will Learn * Create a professional Bootstrap-based website from scratch without using third-party templates * Apply the Bootstrap mobile-first grid system and add responsiveness and aesthetic touches to image elements * Style various types of content and learn how to build a page's layout from scratch by applying the power of Bootstrap 4 * Take advantage of Bootstrap's form helper and contextual classes * Infuse your web pages with life and movement using Bootstrap jQuery plugins * Customize the behavior and features of Bootstrap's jQuery Plugins extensively * Optimize your Bootstrap-based project before deployment * Incorporate Bootstrap into an AngularJS or React application and use Bootstrap components as AngularJS directives or React components In Detail Bootstrap 4 is a free CSS and JavaScript framework that allows developers to rapidly build responsive web-interfaces. Right from the first chapter, dive into building a customized Bootstrap website from scratch. Get to grips with Bootstrap's key features and quickly discover the various ways in which Bootstrap can help you develop web-interfaces. Then take walk through the fundamental features, such as its grid system, helper classes, and responsive utilities. When you have mastered these, you will discover how to structure page layouts, use forms, style different types of content and utilize Bootstrap's various navigation components. Among other things, you will also tour the anatomy of a Bootstrap plugin, creating your own custom components and extending Bootstrap using jQuery. Finally, you will discover how to optimize your website and integrate it with third-party frameworks. By the end of this book, you will have a thorough knowledge of the framework's ins and outs, and be able to build highly customizable and optimized web interfaces. Style and approach This comprehensive step-by-step guide walks you through building a complete website using Bootstrap 4. Each chapter is accompanied by source code and screenshots, and focuses on a distinct set of lessons that are illustrated within the context of a demo project.

Windows Malware Analysis Essentials

by Victor Marak

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book * Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware * Understand how to decipher x86 assembly code from source code inside your favourite development environment * A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn * Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes * Get introduced to static and dynamic analysis methodologies and build your own malware lab * Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief * Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program * Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario * Deal with other malware vectors such as pdf and MS-Office based malware as well as scripts and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with descriptions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.

Practical Django 2 and Channels 2: Building Projects And Applications With Real-time Capabilities

by Federico Marani

Learn how to rapidly build your own ecommerce site by applying Django’s battle-tested components. This book demonstrates Django’s features and conventions to help you develop modern web applications quickly. You'll adopt a "learn by doing" approach and gain a deeper understanding Django by working through a project in which the real-time component will be critical. The book starts with the basics and explains the difference between a Django project and a Django app, the most important settings, how to change them, and the fundamentals of packaging. You'll then be introduced to all the standard tools of Django, along with a sample project. The book then moves on to Channels, a recent addition to the Django ecosystem. It extends the framework with support for real-time operations such as Websockets and other asynchronous features.Practical Django 2 and Channels 2 provides the practical concepts needed to create complex, database-driven websites as easily as possible.What You'll LearnBuild and deploy a simple company site with DjangoDevelop more complex, data-heavy sites using the Django ORMIntegrate Django with ChannelsUnit-test your solutionsWho This Book Is ForPython developers and web developers wanting to learn Django 2 and Channels 2

Introduction to Autonomous Manipulation

by Giacomo Marani Junku Yuh

"Autonomous manipulation" is a challenge in robotic technologies. It refers to the capability of a mobile robot system with one or more manipulators that performs intervention tasks requiring physical contacts in unstructured environments and without continuous human supervision. Achieving autonomous manipulation capability is a quantum leap in robotic technologies as it is currently beyond the state of the art in robotics. This book addresses issues with the complexity of the problems encountered in autonomous manipulation including representation and modeling of robotic structures, kinematic and dynamic robotic control, kinematic and algorithmic singularity avoidance, dynamic task priority, workspace optimization and environment perception. Further development in autonomous manipulation should be able to provide robust improvements of the solutions for all of the above issues. The book provides an extensive tract on sensory-based autonomous manipulation for intervention tasks in unstructured environments. After presenting the theoretical foundations for kinematic and dynamic modelling as well as task-priority based kinematic control of multi-body systems, the work is focused on one of the most advanced underwater vehicle-manipulator system, SAUVIM (Semi-Autonomous Underwater Vehicle for Intervention Missions). Solutions to the problem of target identification and localization are proposed, a number of significant case studies are discussed and practical examples an d experimental/simulation results are presented. The book may inspire the robot research community to further investigate critical issues in autonomous manipulation and to develop robot systems that can profoundly impact our society for the better.

Antisocial: Online Extremists, Techno-Utopians, and the Hijacking of the American Conversation

by Andrew Marantz

From a rising star at The New Yorker, a deeply immersive chronicle of how the optimistic entrepreneurs of Silicon Valley set out to create a free and democratic internet--and how the cynical propagandists of the alt-right exploited that freedom to propel the extreme into the mainstream. <P><P>For several years, Andrew Marantz, a New Yorker staff writer, has been embedded in two worlds. The first is the world of social-media entrepreneurs, who, acting out of naïvete and reckless ambition, upended all traditional means of receiving and transmitting information. The second is the world of the people he calls "the gate crashers"--the conspiracists, white supremacists, and nihilist trolls who have become experts at using social media to advance their corrosive agenda. <P><P>Antisocial ranges broadly--from the first mass-printed books to the trending hashtags of the present; from secret gatherings of neo-Fascists to the White House press briefing room--and traces how the unthinkable becomes thinkable, and then how it becomes reality. Combining the keen narrative detail of Bill Buford's Among the Thugs and the sweep of George Packer's The Unwinding, Antisocial reveals how the boundaries between technology, media, and politics have been erased, resulting in a deeply broken informational landscape--the landscape in which we all now live. <P><P>Marantz shows how alienated young people are led down the rabbit hole of online radicalization, and how fringe ideas spread--from anonymous corners of social media to cable TV to the President's Twitter feed. Marantz also sits with the creators of social media as they start to reckon with the forces they've unleashed. Will they be able to solve the communication crisis they helped bring about, or are their interventions too little too late?

AI überleben: Das Versprechen und die Gefahr Artifizielle Intelligenz

by Janardhan Marappa

Dies ist das Jahrhundert zweier Singularitäten – der wirtschaftlichen Singularität (technologische Arbeitslosigkeit) und der technologischen Singularität (Intelligenzexplosion). Beides birgt enorme Chancen und enorme Herausforderungen. Wenn wir sie erfolgreich verwalten, ist unsere Zukunft als Spezies mehr als wunderbar. Wenn wir versagen, könnte es miserabel sein - und vielleicht kurz. Der Treiber ist Artifizelle Intelligenz (AI) - die leistungsstärkste Technologie der Menschheit. Software, die Probleme löst und Daten in Erkenntnisse umwandelt, hat unser Leben bereits revolutioniert, und die Revolution beschleunigt sich. Das Argument dieses Buches ist, dass wir die stattfindenden Veränderungen überwachen und Richtlinien verabschieden sollten, die die bestmöglichen Ergebnisse fördern. Die Bandbreite der möglichen Ergebnisse ist groß, vom Schrecklichen bis zum Wunderbaren, und sie sind nicht vorherbestimmt. Sie werden zum Teil durch Glück, zum Teil durch ihre eigene interne Logik, zum Teil aber auch durch die Politik auf allen Ebenen der Gesellschaft ausgewählt. Automatisierung und Superintelligenz sind die beiden Entwicklungen, von denen wir bereits sehen, dass sie wahrscheinlich enorme Auswirkungen haben werden. Automatisierung könnte zu einer wirtschaftlichen Singularität und der Entwicklung einer völlig anderen Art von Wirtschaft führen. Wenn wir das falsch verstehen, könnte eine Elite die Produktionsmittel besitzen und den Rest von uns in einem dystopischen technologischen autoritären Regime unterdrücken. Wenn wir es richtig machen, könnten wir eine Wirtschaft des radikalen Überflusses genießen, in der niemand arbeiten muss, um seinen Lebensunterhalt zu verdienen, und wir alle frei sind, Spaß zu haben, unseren Geist zu dehnen und unsere Fähigkeiten voll zu entfalten. Die Ankunft der Superintelligenz wird, falls und wenn sie eintritt, eine technologische Singularität darstellen, die das bedeutendste Ere

Excel 2022 Benutzerhandbuch fu r Einsteiger: Das leicht verständliche Microsoft Excel-Handbuch zum Erlernen des produktiven Umgangs mit Excel

by Janardhan Marappa

Wenn ja, sind Sie hier richtig! In diesem Buch lernen Sie die Grundlagen von Microsoft Excel, Excel-Anwendungen und -Terminologien, Excel-Formeln und -Funktionen, Excel-Tabellen und -Diagramme, Excel-Verknüpfungen und -Tricks und vieles mehr kennen. Die Sprache für Anfänger ist sehr einfach und die Erklärungen werden von vielen Bildern begleitet, um den Weg flüssig und verständlich zu machen. Selbst wenn Sie noch nie mit Excel gearbeitet haben, wird dieses Buch Sie durch die Grundlagen führen, und wenn Sie es schon einmal benutzt haben, werden Sie noch mehr Informationen erhalten. Es ist ein komplettes Handbuch für diejenigen, die gerade erst mit Excel anfangen und all die kleinen Tastaturtricks und Tastenkombinationen verstehen wollen. Darüber hinaus bietet das Buch einfache Tastenkombinationen und Schritt-für-Schritt-Anleitungen. Verschwenden Sie keine Zeit mehr! Steigen Sie sofort ein. Und noch etwas: Am Ende des Buches erhalten Sie einen kostenlosen Zugang zu einem GESCHENK, das Ihnen helfen kann, intelligenter und schneller zu arbeiten, wenn Sie dieses Buch kaufen.

Secrets of the JavaScript Ninja

by Josip Maras

SummaryMore than ever, the web is a universal platform for all types of applications, and JavaScript is the language of the web. If you're serious about web development, it's not enough to be a decent JavaScript coder. You need to be ninja-stealthy, efficient, and ready for anything. This book shows you how.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyJavaScript is rapidly becoming a universal language for every type of application, whether on the web, on the desktop, in the cloud, or on mobile devices. When you become a JavaScript pro, you have a powerful skill set that’s usable across all these domains.About the BookSecrets of the JavaScript Ninja, Second Edition uses practical examples to clearly illustrate each core concept and technique. This completely revised edition shows you how to master key JavaScript concepts such as functions, closures, objects, prototypes, and promises. It covers APIs such as the DOM, events, and timers. You’ll discover best practice techniques such as testing, and cross-browser development, all taught from the perspective of skilled JavaScript practitioners.What’s InsideWriting more effective code with functions, objects, and closuresLearning to avoid JavaScript application pitfallsUsing regular expressions to write succinct text-processing codeManaging asynchronous code with promisesFully revised to cover concepts from ES6 and ES7About the ReaderYou don’t have to be a ninja to read this book—just be willing to become one. Are you ready?About the AuthorsJohn Resig is an acknowledged JavaScript authority and the creator of the jQuery library. Bear Bibeault is a web developer and author of the first edition, as well as coauthor of Ajax in Practice, Prototype and Scriptaculous in Action, and jQuery in Action from Manning. Josip Maras is a post-doctoral researcher and teacher.Table of ContentsPART 1 - WARMING UPJavaScript is everywhereBuilding the page at runtimePART 2 - UNDERSTANDING FUNCTIONSFirst-class functions for the novice: definitions and arguments Functions for the journeyman: understanding function invocation Functions for the master: closures and scopesFunctions for the future: generators and promisesPART 3 - DIGGING INTO OBJECTS AND FORTIFYING YOUR CODEObject orientation with prototypesControlling access to objectsDealing with collectionsWrangling regular expressionsCode modularization techniquesPART 4 - BROWSER RECONNAISSANCEWorking the DOMSurviving eventsDeveloping cross-browser strategies

Computer Forensics: Cybercriminals, Laws, and Evidence

by Marie-Helen Maras

An Updated Edition of the Definitive Computer Forensics Text. Updated to include the most current events and information on cyberterrorism, the second edition of Computer Forensics: Cybercriminals, Laws, and Evidence continues to balance technicality and legal analysis as it enters into the world of cybercrime by exploring what it is, how it is investigated, and the regulatory laws around the collection and use of electronic evidence. Students are introduced to the technology involved in computer forensic investigations and the technical and legal difficulties involved in searching, extracting, maintaining, and storing electronic evidence, while simultaneously looking at the legal implications of such investigations and the rules of legal procedure relevant to electronic evidence. Significant and current computer forensic developments are examined, as well as the implications for a variety of fields including computer science, security, criminology, law, public policy, and administration.

Classical Mechanics with Mathematica® (Modeling and Simulation in Science, Engineering and Technology #0)

by Addolorata Marasco Antonio Romano

This textbook takes a broad yet thorough approach to mechanics, aimed at bridging the gap between classical analytic and modern differential geometric approaches to the subject. Developed by the authors from over 30 years of teaching experience, the presentation is designed to give students an overview of the many different models used through the history of the field—from Newton to Hamilton—while also painting a clear picture of the most modern developments. The text is organized into two parts. The first focuses on developing the mathematical framework of linear algebra and differential geometry necessary for the remainder of the book. Topics covered include tensor algebra, Euclidean and symplectic vector spaces, differential manifolds, and absolute differential calculus. The second part of the book applies these topics to kinematics, rigid body dynamics, Lagrangian and Hamiltonian dynamics, Hamilton–Jacobi theory, completely integrable systems, statistical mechanics of equilibrium, and impulsive dynamics, among others. This new edition has been completely revised and updated and now includes almost 200 exercises, as well as new chapters on celestial mechanics, one-dimensional continuous systems, and variational calculus with applications. Several Mathematica® notebooks are available to download that will further aid students in their understanding of some of the more difficult material. Unique in its scope of coverage and method of approach, Classical Mechanics with Mathematica® will be useful resource for graduate students and advanced undergraduates in applied mathematics and physics who hope to gain a deeper understanding of mechanics.

Statistical Data Analysis Using SAS: Intermediate Statistical Methods (Springer Texts in Statistics)

by Mervyn G. Marasinghe Kenneth J. Koehler

The aim of this textbook (previously titled SAS for Data Analytics) is to teach the use of SAS for statistical analysis of data for advanced undergraduate and graduate students in statistics, data science, and disciplines involving analyzing data.The book begins with an introduction beyond the basics of SAS, illustrated with non-trivial, real-world, worked examples. It proceeds to SAS programming and applications, SAS graphics, statistical analysis of regression models, analysis of variance models, analysis of variance with random and mixed effects models, and then takes the discussion beyond regression and analysis of variance to conclude.Pedagogically, the authors introduce theory and methodological basis topic by topic, present a problem as an application, followed by a SAS analysis of the data provided and a discussion of results. The text focuses on applied statistical problems and methods. Key features include: end of chapter exercises, downloadable SAS code and data sets, and advanced material suitable for a second course in applied statistics with every method explained using SAS analysis to illustrate a real-world problem.New to this edition:• Covers SAS v9.2 and incorporates new commands• Uses SAS ODS (output delivery system) for reproduction of tables and graphics output• Presents new commands needed to produce ODS output• All chapters rewritten for clarity• New and updated examples throughout• All SAS outputs are new and updated, including graphics• More exercises and problems• Completely new chapter on analysis of nonlinear and generalized linear models• Completely new appendixMervyn G. Marasinghe, PhD, is Associate Professor Emeritus of Statistics at Iowa State University, where he has taught courses in statistical methods and statistical computing.Kenneth J. Koehler, PhD, is University Professor of Statistics at Iowa State University, where he teaches courses in statistical methodology at both graduate and undergraduate levels and primarily uses SAS to supplement his teaching.

Logic Programming and Nonmonotonic Reasoning: 16th International Conference, LPNMR 2022, Genova, Italy, September 5–9, 2022, Proceedings (Lecture Notes in Computer Science #13416)

by Marco Maratea Georg Gottlob Daniela Inclezan

This book constitutes the refereed proceedings of the 16th International Conference on Logic Programming and Nonmonotonic Reasoning, LPNMR 2022, held in Genova, Italy, in September 2022. The 34 full papers and 5 short papers included in this book were carefully reviewed and selected from 57 submissions. They were organized in topical sections as follows: Technical Contributions; Systems; Applications.

AI Enabled IoT for Electrification and Connected Transportation (Transactions on Computer Systems and Networks)

by Naveenkumar Marati Akash Kumar Bhoi Victor Hugo C. De Albuquerque Akhtar Kalam

This book presents an overview of artificial intelligence (AI) in the automotive section, especially in the modern era of green energy-based electrification of vehicles and smart transportation systems. The book also discusses different Internet of Things aspects involved in the automotive domain with AI. The book presents autonomous driving systems, advanced driver assistance systems (ADAS), autonomy, AI involvement, and machine learning techniques with challenges in electrification, prognostics, and diagnostics. AI and IoT are two emerging technologies, and their importance in other modern technology electrification on transportation, connected vehicle segment are discussed thoroughly in this book with different topologies. It also presents AI applications in the charging profile prediction, state of charge, state of health, battery lifetime, and battery temperature detection in dynamic conditions. Different algorithms are also given in the book to discuss the nearest point charging station for electric vehicle users. The book also discusses cybersecurity issues and challenges in the real-time environment for AI implementation, IoT in transportation, and autonomous driving. The other aspects of telematics, smart sensors for the implementation of the IoT, and AI are also discussed, especially in guidance and control aspects. The book will be useful for the researchers, practitioners, and industry people working in AI, IoT in the electrification and transportation segment.

Atlas of the Food System: Challenges for a Sustainable Transition of the Lisbon Region

by Teresa Marat-Mendes Sara Silva Lopes João Cunha Borges Patrícia Bento d'Almeida

This book is a visual guide to the territorial dynamics operating within a territory. The reading of such dynamics is fundamental in understanding the role of food in cities. This atlas provides a refreshing approach to the study of the city and of its territory, expanded from the perspective of the food system. This book illustrates the impacts of urban planning options on the function of the contemporary Food System of the Lisbon Region, while disclosing its associated urban form solutions. It provides a possible methodology for the reading of the food system based on an analysis of planning instruments and their morphological outcomes, both in the territory but also on the various built forms which have resulted over time. A key focus of the atlas is exploring how planning has regulated the evolution of the Lisbon Region since the 20th century and its implications on the food system. The atlas results from an exhaustive survey and research work conducted in Lisbon Metropolitan Area for a research project, SPLACH – Spatial Planning for Change, for the past 3 years, in terms of the analysis of its Food System and Urban Planning, aiming to inform the delineation of planning strategies towards a sustainable urban environment. It is an important reference for planners, architects, planning and architecture students as well as municipal technicians and the general public, as it provides a refreshing and useful source of information to support further readings about the food system and its relations to urban planning instruments and urban form solutions. Furthermore, it builds a contemporary reading about possible solutions to promote a sustainable transition of the current food systems, while enhancing the strategic role of planning and urban form.

Windows Phone 7 Silverlight Cookbook

by Jonathan Marbutt Robb Schiefer Jr.

The book is written in a cookbook style, presenting examples in the style of recipes, allowing you to go directly to your topic of interest, or follow topics throughout a chapter to gain in-depth knowledge. All levels of developers and designers will be able to utilize this book. The language and examples are written for beginners but there are plenty of deeper concepts to explore and code to master.

Handbook of Technology Education

by Marc J. de Vries

This handbook of technology education offers a state-of-the-art survey of developments in technology education worldwide. It deals with general themes like philosophical foundations, curriculum, teaching and learning, teacher education, and educational technology. It also has some technology-specific topics, such as designing, making, and assessment (portfolios). To focus on the specific learning challenges a separate section of the book is dedicated to sub-domains of technology and engineering, like food, textiles, materials and robotics. Explicit attention is given to the possible role of technology (and engineering) education in Science, Technology, Engineering and Mathematics (STEM) education. Recent developments such as technology concept learning, authentic learning, pre-university engineering education, design-based learning and design-based research for technology education, pedagogical content knowledge for technology educators, and the use of e-portfoli os are included. One section deals with social and cultural issues, such as education for sustainability, gender issues in technology education, indigenous technologies, industry involvement and the relation between technology education and communication. As could be expected in a handbook on technology education, there is also a section on the use of technology for teaching about technology: the use of CAD, science fiction movies, animations, internet and social media. All chapters are written especially for this handbook by a selection of authors, some of whom have been part of the history of technology education for many years, some of whom are promising young researchers. The book can be used as a reference by technology education researchers to get a concise introduction into the field. It can also be used as a resource in technology teacher education programs. Technology teachers can use it as literature for deepening their understanding of the field and thus working on their continuous professionalization. Curriculum developers and policy makers will find it of interest to get an understanding for the need to have technology education in the curriculum and the way it can be realized in practice.

Progress in Cryptology - AFRICACRYPT 2017: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings (Lecture Notes in Computer Science #10239)

by Marc Joye and Abderrahmane Nitaj

This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017.The 13 papers presented in this book were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on cryptographic schemes, side-channel analysis, differential cryptanalysis, applications, and number theory.

Refine Search

Showing 30,351 through 30,375 of 54,344 results