Browse Results

Showing 53,301 through 53,325 of 61,865 results

Social Touch in Human–Robot Interaction: Symbiotic touch interaction between human and robot

by Masahiro Shiomi Hidenobu Sumioka

In this book for researchers and students, editors Shiomi and Sumioka bring together contributions from researchers working on the CREST project at ATR Deep Interaction Laboratories, a world leader in social robotics, to comprehensively describe robot touch systems from hardware to applications.Appropriate touch from robots to humans is essential for social robots, but achieving this requires various solutions at every stage of the touch process. Through this book, readers will gain an understanding of the needs, essential systems and communication cues, behaviour designs, and real‑world issues for social touch applications. This book compiles and updates technical and empirical research that was previously scattered throughout the literature into a single volume. Through individually authored chapters addressing various elements of ATR’s CREST project, this book tackles key areas where understanding is needed to realize acceptable touch interaction, including pre‑touch interaction, interaction design for touching and being touched, behaviour changes caused by touch interaction, and applications of social touch interaction. It introduces a touch sensor and robots developed by the authors, including several touch‑related behaviours and design policies. This approach will enable readers to easily apply this knowledge to their own social robotics programs. This book is invaluable for anyone who wishes to understand and develop social robots that physically interact with people.It is most beneficial for researchers and upper undergraduate and graduate students in the fields of human–robot/agent/computer interaction and social touch interaction and those in the broader fields of engineering, computer science, and cognitive science.

From Concepts to Code: Introduction to Data Science

by Adam P. Tashman

The breadth of problems that can be solved with data science is astonishing, and this book provides the required tools and skills fot a broad audience. The reader takes a journey into the forms, uses, and abuses of data and models, and learns how to critically examine each step. Python coding and data analysis skills are built from the ground up, with no prior coding experience assumed. The necessary background in computer science, mathematics, and statistics is provided in an approachable manner.Each step of the machine learning lifecycle is discussed, from business objective planning to monitoring a model in production. This end-to-end approach supplies the broad view necessary to sidestep many of the pitfalls that can sink a data science project. Detailed examples are provided from a wide range of applications and fields, from fraud detection in banking to breast cancer classification in healthcare. The reader will learn the techniques to accomplish tasks that include predicting outcomes, explaining observations, and detecting patterns. Improper use of data and models can introduce unwanted effects and dangers to society. A chapter on model risk provides a framework for comprehensively challenging a model and mitigating weaknesses. When data is collected, stored, and used, it may misrepresent reality and introduce bias. Strategies for addressing bias are discussed. From Concepts to Code: Introduction to Data Science leverages content developed by the author for a full-year data science course suitable for advanced high school or early undergraduate students. This course is freely available and it includes weekly lesson plans.

Computational Design for Landscape Architects

by Brendan Harmon

This book is a guide to computational design for landscape architects replete with extensive tutorials. It introduces algorithmic approaches for modeling and designing landscapes. The aim of this book is to use algorithms to understand and design landscape as a generative system, i.e. to harness the processes that shape landscape to generate new forms. An algorithmic approach to design is gently introduced through visual programming with Grasshopper, before more advanced methods are taught in Python, a high-level programming language. Topics covered include parametric design, randomness and noise, waves and attractors, lidar, drone photogrammetry, point cloud modeling, terrain modeling, earthworks, digital fabrication, and more. The chapters include sections on theory, methods, and either visual programming or scripting. Online resources for the book include code and datasets so that readers can easily follow along and try out the methods presented. This book is a much-needed guide, both theoretical and practical, on computational design for students, educators, and practitioners of landscape architecture.

Digital Image Security: Techniques and Applications

by Amit Kumar Singh Stefano Berretti Ashima Anand Amrit Kumar Agrawal

This book will highlight cutting-edge research with a particular emphasis on interdisciplinary approaches, novel techniques, and solutions to provide digital image security for applications in diverse areas. It further discusses important topics such as biometric imaging, big data security and privacy in healthcare, security and privacy in the internet of things, and security in cloud-based image processing.This book Presents new ideas, approaches, theories, and practices with a focus on digital image security and privacy solutions for real-world applications. Discusses security in cloud-based image processing for smart city applications. Provides an overview of innovative security techniques that are being developed to ensure the guaranteed authenticity of transmitted, shared, or stored digital images. Highlights approaches such as watermarking, blockchain, and hashing. to secure digital images in artificial intelligence, machine learning, cloud computing, and temper detection environments. Explains important topics such as biometric imaging, blockchain for digital data security, and protection systems against personal identity theft. It will serve as an ideal reference text for senior undergraduate, graduate students, academic researchers, and professionals in the fields including electrical engineering, electronics, communications engineering, and computer engineering.

AI for Peace (AI for Everything)

by Paige Arthur Branka Panic

The role of artificial intelligence in war is widely recognized, but is there also a role for AI in fostering peace and preventing conflict? AI for Peace provides a new perspective on AI as a potential force for good in conflict-affected countries through its uses for early warning, combating hate speech, human rights investigations, and analyzing the effects of climate change on conflict. This book acts as an essential primer for introducing people working on peacebuilding and conflict prevention to the latest advancements in emerging AI technologies and will act as guide for ethical future practice. This book also aims to inspire data scientists to engage in the peacebuilding and prevention fields and to better understand the challenges of applying data science in conflict and fragile settings.

Learn R: As a Language (Chapman & Hall/CRC The R Series)

by Pedro J. Aphalo

Learning a computer language like R can be either frustrating, fun or boring. Having fun requires challenges that wake up the learner’s curiosity but also provide an emotional reward for overcoming them. The book is designed so that it includes smaller and bigger challenges, in what I call playgrounds, in the hope that all readers will enjoy their path to R fluency. Fluency in the use of a language is a skill that is acquired through practice and exploration. For students and professionals in the biological sciences, humanities and many applied fields, recognizing the parallels between R and natural languages should help them feel at home with R. The approach I use is similar to that of a travel guide, encouraging exploration and describing the available alternatives and how to reach them. The intention is to guide the reader through the R landscape of 2024 and beyond.What is new in the second edition? Text expanded by more than 25% to include additional R features and gentler and more detailed explanations Contains 24 new diagrams and flowcharts, seven new tables, and revised text and code examples for clarity All three indexes were expanded, and answers to 28 frequently asked questions added What will you find in this book? Programming concepts explained as they apply to current R Emphasis on the role of abstractions in programming Few prescriptive rules—mostly the author’s preferences together with alternatives Presentation of the R language emphasizing the “R way of doing things” Tutoring for “programming in the small” using scripts for data analysis Explanation of the differences between R proper and extensions for data wrangling The grammar of graphics is described as a language for the construction of data visualisations Examples of data exchange between R and the foreign world using common file formats Coaching to become an independent R user, capable of writing original scripts and solving future challenges

Secure and Smart Cyber-Physical Systems

by Danda B. Rawat Uttam Ghosh Fortune Mhlanga

Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the interconnected and often critical nature of these systems. The integration of AI/ML into the realm of IoT and CPS security has gained significant attention and momentum in recent years. The success of AI/ML in various domains has sparked interest in leveraging these technologies to enhance the security, resilience, and adaptability of IoT and CPS. Secure and Smart Cyber-Physical Systems provides an extensive exploration of AI/ML-based security applications in the context of IoT and CPS.Features• Presents cutting-edge topics and research in IoT and CPS.• Includes contributions from leading worldwide researchers.• Focuses on CPS architectures for secure and smart environments.• Explores AI/ML and blockchain approaches for providing security and privacy to CPS including smart grids, smart cities, and smart healthcare.• Provides comprehensive guidance into the intricate world of software development for medical devices.• Covers a blueprint for the emergence of 6G communications technology in Industry 5.0 and federated-learning-based secure financial services.This book covers state-of-the-art problems, existing solutions, and potential research directions for CPS researchers, scholars, and professionals in both industry and academia.

Intelligent Security Solutions for Cyber-Physical Systems (Chapman & Hall/CRC Cyber-Physical Systems)

by Bharat Bhargava Yashwant Singh Vandana Mohindru Sood Sushil Kumar Narang

A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science. This text mainly concentrates on offering a foundational theoretical underpinning, and a comprehensive and coherent review of intelligent security solutions for cyber-physical systems. Features: • Provides an overview of cyber-physical systems (CPSs) along with security concepts like attack detection methods, cyber-physical systems failures, and risk identification and management. • Showcases cyber-physical systems (CPSs) security solutions, lightweight cryptographic solutions, and CPS forensics, etc. • Emphasizes machine learning methods for behavior-based intrusion detection in cyber-physical systems (CPSs), resilient machine learning for networked CPS, fog computing industrial CPS, etc. • Elaborates classification of network abnormalities in Internet of Things-based cyber-physical systems (CPSs) using deep learning. • Includes case studies and applications in the domain of smart grid systems, industrial control systems, smart manufacturing, social network and gaming, electric power grid and energy systems, etc.

Complex Digital Hardware Design

by Istvan Nagy

This book is about how to design the most complex types of digital circuit boards used inside servers, routers and other equipment, from high-level system architecture down to the low-level signal integrity concepts. It explains common structures and subsystems that can be expanded into new designs in different markets.The book is targeted at all levels of hardware engineers. There are shorter, lower-level introductions to every topic, while the book also takes the reader all they way to the most complex and most advanced topics of digital circuit design, layout design, analysis, and hardware architecture.

Mastering Project Discovery: Successful Discipline in Engineering and Analytics Projects

by Elliot Bendoly Daniel Bachrach Kathy Koontz Porter Schermerhorn

Introducing a comprehensive approach to invigorate project leadership, this book provides a framework – the OUtCoMES Cycle – for developing, managing, advancing, and optimizing engineering and analytics projects.All too often, issues of moral hazard and completion bias prevent engineering and analytics managers and team leaders from asking the critical question 'What’s the problem?', before committing time, energy, and resources to solve it. This book draws attention to the definition, structuring, option consideration and ultimately the addressing of the right problems, exploring the OUtCoMES Cycle framework that facilitates and energizes systematic thinking, knowledge sharing, and on-the-fly adjustment with an explicit focus on the maximization of value and ROI. Each chapter includes discussions and lessons in analytical and engineering problem identification, problem structuring, iterative problem development (mental and computational) and problem resolution, at least three embedded real-world case studies, and a closing 'Practitioner’s Recap' to contextualize key chapter takeaways.Written by a team of established academic scholars and practicing analysts and engineers, this is an accessible and culture-shifting action guide for instructors interested in training the next generation of project and analytics leaders, students of analytics and engineering, as well as practicing project leaders and principals.

IoT Fundamentals with a Practical Approach

by Sonali Goyal Neera Batra

IoT Fundamentals with a Practical Approach is an insightful book that serves as a comprehensive guide to understanding the foundations and key concepts of Internet of Things (IoT) technologies.The book begins by introducing readers to the concept of IoT, explaining the significance and potential impact on various industries and domains. It covers the underlying principles of IoT, including its architecture, connectivity, and communication protocols, providing readers with a solid understanding of how IoT systems are structured and how devices interact within an IoT ecosystem.This book dives into the crucial components that form the backbone of IoT systems. It explores sensors and actuators, explaining their roles in collecting and transmitting data from the physical environment. The book also covers electronic components used in IoT devices, such as microcontrollers, communication modules, and power management circuits. This comprehensive understanding of the building blocks of IoT allows readers to grasp the technical aspects involved in developing IoT solutions.Security is a vital aspect of IoT, and the book dedicates a significant portion to exploring security challenges and best practices in IoT deployments. It delves into topics such as authentication, encryption, access control, and secure firmware updates, providing readers with essential insights into safeguarding IoT systems against potential threats and vulnerabilities.This book also addresses the scalability and interoperability challenges of IoT. It discusses IoT platforms and frameworks that facilitate the development and management of IoT applications, highlighting their role in enabling seamless integration and communication between devices and systems.The book is written in a clear and accessible manner and includes real-world examples, making it suitable for both beginners and professionals looking to enhance their understanding of IoT. It serves as a valuable resource for engineers, developers, researchers, and decision-makers involved in IoT projects and provides them with the knowledge and tools necessary to design, implement, and secure IoT solutions.

Convergence of Blockchain and Internet of Things in Healthcare (Smart Engineering Systems: Design and Applications)

by Arun Kumar Rana, Vishnu Sharma, Ajay Rana, Maksud Alam and Suman Lata Tripathi

The Internet of Things (IoT) and blockchain are two new technologies that combine elements in many ways. A system where the virtual and physical worlds interact is created by integrating pervasive computing, ubiquitous computing, communication technologies, sensing technologies, Internet Protocol, and embedded devices. A massive number of linked devices and vast amounts of data present new prospects for developing services that can directly benefit the economy, environment, society, and individual residents. Due to the size of IoT and insufficient data security, security breaches may have a huge impact and negative effects. IoT not only connects gadgets but also people and other entities, leaving every IoT component open to a wide variety of assaults. The implementation and application of IoT and blockchain technology in actual scientific, biomedical, and data applications are covered in this book. The book highlights important advancements in health science research and development by applying the distinctive capabilities inherent to distributed ledger systems. Each chapter describes the current uses of blockchain in real-world data collection, medicine development, device tracking, and more meaningful patient interaction. All of these are used to create opportunities for expanding health science research. This paradigm change is studied from the perspectives of pharmaceutical executives, biotechnology entrepreneurs, regulatory bodies, ethical review boards, and blockchain developers.Key Features: Provides a foundation for the implementation process of blockchain and IoT devices based on healthcare-related technology Image processing and IoT device researchers can correlate their work with other requirements of advanced technology in the healthcare domain Conveys the latest technology, including artificial intelligence and machine learning, in healthcare-related technology Useful for the researcher to explore new things like security, cryptography, and privacy in healthcare related technology Tailored for people who want to start in healthcare-related technology with blockchain and IoT This book is primarily for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer science and engineering, and biomedical engineering.

Tabletop Game Accessibility: Meeple Centred Design

by Michael James Heron

This foundational resource on the topic of tabletop game accessibility provides actionable guidelines on how to make games accessible for people with disabilities. This book contextualises this practical guidance within a philosophical framework of how the relatively abled can ethically address accessibility issues within game design.This book helps readers to build understanding and empathy across the various categories of accessibility. Chapters on each category introduce ‘the science’, outline the game mechanics and games that show exemplar problems, relate these to the real-world situations that every player may encounter, and then discuss how to create maximally accessible games with reference to the accessibility guidelines and specific games that show ‘best-in-class’ examples of solutions.This book will be of great interest to all professional tabletop and board game designers as well as digital game designers and designers of other physical products.

Cybercrime and Digital Deviance

by Roderick S. Graham 'Shawn K. Smith

Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and “canceling” people for perceived violations of norms.Other issues are explored including cybercrime investigations, nation-state cybercrime, the use of algorithms in policing, cybervictimization, and expanded discussion of the theories used to explain cybercrime. Graham and Smith conceptualize the online space as a distinct environment for social interaction, framing their work with assumptions informed by their respective work in urban sociology and spatial criminology, and offering an engaging entry point for understanding what may appear to be a technologically complex course of study. The authors apply a modified version of a typology developed by David Wall: cybertrespass, cyberfraud, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime, while its use of legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions provides a solid foundation for deeper study. In this edition each chapter includes a new “Current Events and Critical Thinking” section, using concepts from the chapter to explore a specific event or topic like the effect of disinformation on social cohesion and politics.Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper-level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.

Using Metering to Perform Energy Management: Performing Data Analytics via the Metering System (River Publishers Series in Energy Management)

by George “Buster” Barksdale Kecia Pierce

This book covers many helpful analysis tools and processes to assist energy managers (EMs) administer their energy program through their meter management system (MMS). These tools and the corresponding techniques offer opportunities for the EM to optimize their time. If fully utilized, the MMS will allow an EM to reduce field time significantly, as they can perform most of the energy management pre-analysis, benchmarking, data analysis and, in many cases, complete the task of performing a virtual audit remotely from their office.The book covers many instructional areas that are, for the most part, only offered by consulting groups and software vendors as services. Those two groups offer their services for fees and therefore do not publish their ideas or best practices for commercial use. Software vendors provide software analytics whose functional aspects are addressed by our descriptions of the essential tasks in each chapter. This book allows EMs to expand their knowledge of software capabilities by viewing other best practices. Consulting groups offer services in a few areas: basic benchmarking and monitoring-based commissioning (MBCx). These services are considered essential to energy management but are generally implemented as on-site services, which, due to their nature, are much more expensive than a monitoring commissioning (MCx) solution. Monitoring commissioning, in contrast to MBCx, is purely done at the monitoring level and allows you to manage the critical energy measures that comprise the majority of the savings, but without getting into the field testing.Benchmarking is covered much deeper in the book as we show how to benchmark each system within a building. The benchmarking sections show how to automatically analyze each system’s usage into a separate benchmark for baseload, lighting, AC, and fan/pump systems. These systems produce benchmarks so EMs can compare by site, category type, climate zone, etc. We also introduce benchmarks that enable the EM to utilize tools to determine the performance of each system and which are their most significant energy users. These analytics functions are covered to produce results that identify potential energy savings for each energy system.

Research Advances in Network Technologies: Volume 2

by Anshul Verma Pradeepika Verma

In the present technological age, information is a valuable resource for both small and large enterprises as well as for our daily lives. The key enablers that link computer resources and devices together to gather, process, and distribute crucial data both locally and worldwide are network technologies. For our daily lives and commercial operations, network technologies offer effective, adaptable, and seamless communication while maximizing productivity and resources.Due to its significance, this field has undergone a significant evolution in the past few decades, moving away from traditional wired networks and toward Bluetooth, infrared, microwave, radio, and satellite networks. These days, network technologies are not employed only in computer labs, businesses, or homes; a wide range of domains, such as vehicular ad hoc networks, mobile ad hoc networks, and the Internet of Things, have been seen using network technologies.Researchers from academia and industry have worked hard to build and develop software-based network technologies, such as middleware, protocol stacks, and network software architectures, in addition to hardware-based and physical network technologies. The paradigm shift in this field is being driven primarily by software-based network technologies, which have also given rise to numerous new network innovations, including grid computing, cloud computing, fog computing, edge computing, software-defined networks, and content-centric networks. Significant efforts have been made in cellular network technologies to boost the user experience, and as a result, new cellular network technologies, including LTE, VoLTE, and 5G, have also been developed.Efforts continue to be made by researchers in these networking fields due to the demand for and importance of these technologies in present and future situations. Many of these efforts are still in progress, and there are still possibilities that need to be investigated. As a result, it’s important to stay up to date on network technology developments and look into further research difficulties that need to be resolved for the benefit of users. This book will present the most recent and leading research in the field of network technologies in order to achieve solutions for various problems that exist in this domain.

Reading Digital Fiction: Narrative, Cognition, Mediality (Routledge Interdisciplinary Perspectives on Literature)

by Astrid Ensslin Alice Bell

Reading Digital Fiction offers the first comprehensive and systematic theoretical, methodological, and analytical examination of digital fiction from a cognitive and empirical perspective. Proposing the new concept of “medial reading”, it argues for the centrality of an audience’s interest in, awareness of and/or attention to the medium in which a text is produced and received, and which we argue should be applied to reader data across media. The book analyses and theorises five generations of digital fiction and their reading including hypertext fiction, hypermedia fiction, narrative video games, app fiction, and virtual reality. It showcases medium- and platform-specific methods of qualitative reader response research across a variety of contexts and settings from screen-based and embodied interaction to gallery installation, and from reading group and individual interview to think-aloud methodologies. The book thus addresses the unique affordances of digital fiction reading by designing and reporting on new empirical studies focusing on hypertextuality, interactivity, immersion, as well as medium-specific forms of textual “you”, ontological ambiguity, reader orientation and empathy. In so doing, the book refines, critiques, and expands cognitive, transmedial, and empirical narratology and stylistics by placing the reader of these new narratives front and centre.The Open Access version of this book, available at http://www.taylorfrancis.com, has been made available under a Creative Commons [Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND)] 4.0 license.

Research Advances in Intelligent Computing: Volume 2

by Anshul Verma Pradeepika Verma

Researchers and scientists have invested a great deal of effort into developing computers and other devices to be more capable of doing a wider range of tasks. As a result, the potential of computers to do a wide range of tasks in different environments, at varying speeds, and in smaller forms is growing dramatically every day. Currently, there is a race to create robots or computers with human-level intelligence. Artificial Intelligence (AI) is the ability of a machine or software to think like a human being. The study of the human brain, specifically how humans learn, make decisions, and react when trying to solve issues, is the basis of AI. The creation of intelligent software and systems, or intelligent computing (IC), is the outcome of AI studies. An IC system can perceive, reason, learn, and use language. In IC systems, AI and other cutting-edge techniques are employed to create system intelligence. IC has been applied to almost every area of computer science, including networking, software engineering, gaming, robotics, expert systems, natural language processing, computer vision, image processing, and data science. In modern times, IC is also employed to tackle a wide range of challenging issues in numerous disciplines, such as weather forecasting, agriculture science, medicine, and economics. This book offers the most recent advancements in both IC and AI for all these reasons.

Data Mining with Python: Theory, Application, and Case Studies (Chapman & Hall/CRC The Python Series)

by Di Wu

Data is everywhere and it’s growing at an unprecedented rate. But making sense of all that data is a challenge. Data Mining is the process of discovering patterns and knowledge from large data sets, and Data Mining with Python focuses on the hands-on approach to learning Data Mining. It showcases how to use Python Packages to fulfill the Data Mining pipeline, which is to collect, integrate, manipulate, clean, process, organize, and analyze data for knowledge.The contents are organized based on the Data Mining pipeline, so readers can naturally progress step by step through the process. Topics, methods, and tools are explained in three aspects: “What it is” as a theoretical background, “why we need it” as an application orientation, and “how we do it” as a case study.This book is designed to give students, data scientists, and business analysts an understanding of Data Mining concepts in an applicable way. Through interactive tutorials that can be run, modified, and used for a more comprehensive learning experience, this book will help its readers to gain practical skills to implement Data Mining techniques in their work.Dr. Di Wu is an Assistant Professor of Finance, Information Systems, and Economics department of Business School, Lehman College. He obtained a Ph.D. in Computer Science from the Graduate Center, CUNY. Dr. Wu’s research interests are Temporal extensions to RDF and semantic web, Applied Data Science, and Experiential Learning and Pedagogy in Business Education. Dr. Wu developed and taught courses including Strategic Management, Databases, Business Statistics, Management Decision Making, Programming Languages (C++, Java, and Python), Data Structures and Algorithms, Data Mining, Big Data, and Machine Learning.

Playing with Infinity: Turtles, Patterns, and Pictures (AK Peters/CRC Recreational Mathematics Series)

by Hans Zantema

This is a book about infinity - specifically the infinity of numbers and sequences. Amazing properties arise, for instance, some kinds of infinity are argued to be greater than others. Along the way the author will demonstrate how infinity can be made to create beautiful ‘art’, guided by the development of underlying mathematics. This book will provide a fascinating read for anyone interested in number theory, infinity, math art, and/or generative art, and could be used a valuable supplement to any course on these topics.Features: Beautiful examples of generative art Accessible to anyone with a reasonable high school level of mathematics Full of challenges and puzzles to engage readers

Exploring Operations Research with R (Chapman & Hall/CRC Series in Operations Research)

by Jim Duggan

Exploring Operations Research with R shows how the R programming language can be a valuable tool – and way of thinking – which can be successfully applied to the field of operations research (OR). This approach is centred on the idea of the future OR professional as someone who can combine knowledge of key OR techniques (e.g., simulation, linear programming, data science, and network science) with an understanding of R, including tools for data representation, manipulation, and analysis. The core aim of the book is to provide a self-contained introduction to R (both Base R and the tidyverse) and show how this knowledge can be applied to a range of OR challenges in the domains of public health, infectious disease, and energy generation, and thus provide a platform to develop actionable insights to support decision making.Features Can serve as a primary textbook for a comprehensive course in R, with applications in OR Suitable for post-graduate students in OR and data science, with a focus on the computational perspective of OR The text will also be of interest to professional OR practitioners as part of their continuing professional development Linked to a Github repository including code, solutions, data sets, and other ancillary material

Bioinformatics for Oral Cancer: Current Insights and Advances

by Raghavendra Amachawadi Shiva Prasad Kollur Chandan Shivamallu Mahesh Kp

Amid the rising global concern of oral cancer, this book provides a compelling exploration of the intricate oral cavity, focused on shedding light on early diagnosis and addressing outdated paradigms, it delves into the persistent challenges of oral premalignant lesions. Tailored for both beginners and researchers, its six chapters encompass the spectrum of genome sequencing, diagnostic biomarkers, gene expression, and more. Discover a fusion of basic and clinical sciences, aiming to invigorate the study of bioinformatics and oral cancer, and ultimately improve survival rates.Bioinformatics for Oral Cancer: Current Insights and Advances serves as a comprehensive guide, offering a deep dive into the multifaceted landscape of oral cancer research and bioinformatics. Within its pages, readers will uncover a wealth of knowledge, starting with foundational chapters introducing bioinformatics and establishing the backdrop of oral cancer. The book then progresses into the realm of diagnostic biomarkers, revealing cutting-edge methodologies for their identification in the context of oral cancer. The book’s keen focus extends to gene expression profiles and the intricacies of gene sequencing in the context of oral cancer progression. By systematically unravelling these critical aspects, the book bridges the gap between basic and clinical sciences, equipping readers with a holistic understanding of bioinformatics’ pivotal role in enhancing our grasp of oral cancer’s complexities.By deciphering the enigmatic landscape of oral premalignant lesions, the book equips clinicians and researchers with tools to predict malignant potentials. Its meticulous exploration of gene expression profiles and sequencing promises to reshape early detection strategies, propelling the field towards improved diagnosis and treatment outcomes.

What Every Engineer Should Know About Digital Accessibility (ISSN)

by Sarah Horton David Sloan

Accessibility is a core quality of digital products to be deliberately addressed throughout the development lifecycle. What Every Engineer Should Know About Digital Accessibility will prepare readers to integrate digital accessibility into their engineering practices. Readers will learn how to accurately frame accessibility as an engineering challenge so they are able to address the correct problems in the correct way.Illustrated with diverse perspectives from accessibility practitioners and advocates, this book describes how people with disabilities use technology, the nature of accessibility barriers in the digital world, and the role of engineers in breaking down those barriers. Accessibility competence for current, emerging, and future technologies is addressed through a combination of guiding principles, core attributes and requirements, and accessibility‑informed engineering practices.FEATURES Discusses how technology can support inclusion for people with disabilities and how rigorous engineering processes help create quality user experiences without introducing accessibility barriers Explains foundational principles and guidelines that build core competency in digital accessibility as they are applied across diverse and emerging technology platforms Highlights practical insights into how engineering teams can effectively address accessibility throughout the technology development lifecycle Uses international standards to define and measure accessibility quality Written to be accessible to non‑experts in the subject area, What Every Engineer Should Know About Digital Accessibility is aimed at students, professionals, and researchers in the field of software engineering.

Absolute Essentials of Ethereum (Absolute Essentials of Business and Economics)

by Paul Dylan-Ennis

Absolute Essentials of Ethereum is a concise textbook which guides the reader through the fascinating world of the emerging Ethereum ecosystem, from the basics of how its blockchain works to cutting-edge applications.Written by an experienced educator, each chapter is designed to progress potential students from class to class. Technical concepts are clearly explained for those new to the topic and readers are supported with definitions and summaries in each chapter. Real-life case studies situate the overviews in a contemporary context. Topics covered include the Ethereum Execution and Consensus layers, Ethereum governance and community, Decentralised Autonomous Organisations (DAOs), Decentralised Finance (DeFi), Non-Fungible Tokens (NFTs) and Layer 2.This book is the ideal text to support undergraduate and postgraduate courses on blockchain technologies, cryptocurrencies, Web3 and fintech, as well as for those who want to know how Ethereum really works.

Blockchain and AI: The Intersection of Trust and Intelligence (Smart Technology)

by Ganesh Chandra Deka Niaz Chowdhury

In the rapidly evolving landscape of the digital age, two technologies stand out for their transformative potential: Artificial Intelligence (AI) and Blockchain. This book offers an incisive exploration of the confluence between these technological titans, shedding light on the synergies, challenges, and innovations that arise at this intersection. The chapters explore thought-provoking analyses, informed by cutting-edge research and expert perspectives, that navigate the nuanced interplay of decentralized ledger technology and intelligent systems. From potential applications in teaching and learning, finance, healthcare, and governance to ethical considerations and future trajectories, this volume serves as an essential compendium for scholars, professionals, and anyone keen to grasp the future of digital innovation.

Refine Search

Showing 53,301 through 53,325 of 61,865 results