- Table View
- List View
Contactless Human Activity Analysis (Intelligent Systems Reference Library #200)
by Md Atiqur Rahman Ahad Upal Mahbub Tauhidur RahmanThis book is a truly comprehensive, timely, and very much needed treatise on the conceptualization of analysis, and design of contactless & multimodal sensor-based human activities, behavior understanding & intervention. From an interaction design perspective, the book provides views and methods that allow for more safe, trustworthy, efficient, and more natural interaction with technology that will be embedded in our daily living environments. The chapters in this book cover sufficient grounds and depth in related challenges and advances in sensing, signal processing, computer vision, and mathematical modeling. It covers multi-domain applications, including surveillance and elderly care that will be an asset to entry-level and practicing engineers and scientists.(See inside for the reviews from top experts)
Contactless VLSI Measurement and Testing Techniques
by Selahattin SayilThis book provides readers with a comprehensive overview of the state-of-the-art in optical contactless probing approaches, in order to fill a gap in the literature on VLSI Testing. The author highlights the inherent difficulties encountered with the mechanical probe and testability design approaches for functional and internal fault testing and shows how contactless testing might resolve many of the challenges associated with conventional mechanical wafer testing. The techniques described in this book address the increasing demands for internal access of the logic state of a node within a chip under test.
Contagious Architecture: Computation, Aesthetics, and Space (Technologies of Lived Abstraction)
by Luciana ParisiA proposal that algorithms are not simply instructions to be performed but thinking entities that construct digital spatio-temporalities.In Contagious Architecture, Luciana Parisi offers a philosophical inquiry into the status of the algorithm in architectural and interaction design. Her thesis is that algorithmic computation is not simply an abstract mathematical tool but constitutes a mode of thought in its own right, in that its operation extends into forms of abstraction that lie beyond direct human cognition and control. These include modes of infinity, contingency, and indeterminacy, as well as incomputable quantities underlying the iterative process of algorithmic processing. The main philosophical source for the project is Alfred North Whitehead, whose process philosophy is specifically designed to provide a vocabulary for “modes of thought” exhibiting various degrees of autonomy from human agency even as they are mobilized by it. Because algorithmic processing lies at the heart of the design practices now reshaping our world—from the physical spaces of our built environment to the networked spaces of digital culture—the nature of algorithmic thought is a topic of pressing importance that reraises questions of control and, ultimately, power. Contagious Architecture revisits cybernetic theories of control and information theory's notion of the incomputable in light of this rethinking of the role of algorithmic thought. Informed by recent debates in political and cultural theory around the changing landscape of power, it links the nature of abstraction to a new theory of power adequate to the complexities of the digital world.
Container Handling in Automated Yard Blocks: An Integrative Approach Based on Time Information (Contributions to Management Science)
by Filip CovicThe yard block of a container terminal is the central point of synchronisation for asynchronous container flows between deep-sea vessels and transport to the hinterland. The structure of the block stipulates that containers are stacked on top of each other with only the topmost container directly accessible by a yard crane. This book describes a holistic and integrative approach to container handling in yard blocks to optimise productivity by minimising re-handling operations. The results provide insights for academic scholars as well as for experts from practical terminal planning and operations. The approach presented is two-fold: first, a theoretical foundation of the interdependencies in decision-making is established using mathematical programming. Secondly, operations involving uncertain container arrival information are examined on the basis of a simulation with a rigorous experimental design and statistical evaluation. In this context, the book develops container-handling strategies and analyses the impact of a system for vehicle arrival management – the "Terminal Appointment System". The findings presented in this book are the result of a close cooperation with experts at the port of Hamburg and build on previous research.
Container Security: Fundamental Technology Concepts that Protect Containerized Applications
by Liz RiceTo facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions.Author Liz Rice, VP of open source engineering at Aqua Security, looks at how the building blocks commonly used in container-based systems are constructed in Linux. You’ll understand what’s happening when you deploy containers and learn how to assess potential security risks that could affect your deployments. If you run container applications with kubectl or docker and use Linux command-line tools such as ps and grep, you’re ready to get started.Explore attack vectors that affect container deploymentsDive into the Linux constructs that underpin containersExamine measures for hardening containersUnderstand how misconfigurations can compromise container isolationLearn best practices for building container imagesIdentify container images that have known software vulnerabilitiesLeverage secure connections between containersUse security tooling to prevent attacks on your deployment
Containerization with Ansible 2
by Aric RenzoAutomate the container lifecycle from image build through cloud deployment using the automation language you already know. About This Book • Use Ansible Container as an integral part of your workflow to increase flexibility and portability. • Manage the container life cycle using existing Ansible roles and automate the entire container build, deployment and management process. • A step-by-step guide that will get you up and running from building a simple container image to deploying a complex, multi-container app in the cloud. Who This Book Is For This book is aimed at DevOps engineers, administrators and developers who already have some familiarity with writing and running Ansible playbooks, and want to learn how to use Ansible to implement containerization. What You Will Learn • Increase your productivity by using Ansible roles to define and build images • Learn how to work with Ansible Container to manage, test, and deploy your containerized applications. • Increase the flexibility and portability of your applications by learning to use Ansible • Discover how you can apply your existing Ansible roles to the image build process • Get you up and running from building a simple container image to deploying a complex, multi-container app in the cloud. • Take an indepth look at the architecture of Ansible Container, and learn how to build re-usable container images, reliably and efficiently. In Detail Today many organizations are adopting containerization and DevOps methodologies to improve the flexibility and reliability of deploying new applications. Building custom application containers often means leveraging brittle and oftentimes complex Dockerfiles that can lead to cumbersome, multi-layered containers. Ansible Container brings a new workflow for managing the development of containers from development all the way through to production. The goal of this book is to get you up and running with Ansible Container so that you can create container images from Ansible roles, run containers locally, and deploy them to the cloud. We'll progress from a simple, single container application, to a complex application consisting of multiple, connected containers. You'll learn how to run the application locally, how to deploy it to an OpenShift cluster running locally, and how to deploy it to a Kubernetes cluster running in the cloud. Along the way, you'll see how to use roles to define each image or micro-service, and how to share your completed project with the Ansible community. Next, you will be able to take full advantage of Ansible Container, and use it to automate the container lifecycle in your own projects. By the end of this book,you will gain mastery of the Ansible Container platform by building complex multi-container projects ready for deployment into production. Style and approach This book will walk you through Ansible Containerization from building a simple container image to deploying a complex, multi-container app in the cloud. You will get an in-depth understanding of how to effectively manage containers using Ansible 2.
Containerization with LXC
by Konstantin IvanovThis book is for Linux engineers and software developers who are looking to deploy applications in a fast, secure and scalable way, both for testing and production use.
Containers in OpenStack: Leverage OpenStack services to make the most of Docker, Kubernetes and Mesos
by Vinoth Kumar Selvaraj Felipe Monteiro Venkatesh Loganathan Pradeep Kumar Singh Madhuri KumariKey Features Gets you acquainted with containerization in private cloud Learn to effectively manage and secure your containers in OpenStack Practical use cases on container deployment and management using OpenStack components Book Description Containers are one of the most talked about technologies of recent times. They have become increasingly popular as they are changing the way we develop, deploy, and run software applications. OpenStack gets tremendous traction as it is used by many organizations across the globe and as containers gain in popularity and become complex, it’s necessary for OpenStack to provide various infrastructure resources for containers, such as compute, network, and storage. Containers in OpenStack answers the question, how can OpenStack keep ahead of the increasing challenges of container technology? You will start by getting familiar with container and OpenStack basics, so that you understand how the container ecosystem and OpenStack work together. To understand networking, managing application services and deployment tools, the book has dedicated chapters for different OpenStack projects: Magnum, Zun, Kuryr, Murano, and Kolla. Towards the end, you will be introduced to some best practices to secure your containers and COE on OpenStack, with an overview of using each OpenStack projects for different use cases. What you will learn Understand the role of containers in the OpenStack ecosystem Learn about containers and different types of container runtimes tools. Understand containerization in OpenStack with respect to the deployment framework, platform services, application deployment, and security Get skilled in using OpenStack to run your applications inside containers Explore the best practices of using containers in OpenStack.
Contemporary Architecture and the Digital Design Process
by Peter SzalapajContemporary Architecture and the Digital Design Process introduces the reader to new developments in the computer modelling of design form in contemporary architectural practice through a series of detailed case studies. The book illustrates how evolving design practices use and exploit the potential of new computing technologies in a wide range of areas and application.A central thesis of this book is that technology follows design demand, rather than design adjusting to available new technology. Designers are not merely passive recipients of prescribed computing tools and techniques. Instead, they are increasingly able to express their intuitive design ideas through the rational medium of computing.The book features several contemporary building projects, each of which introduces a range of CAD and computing issues based upon the work of creative architectural and engineering design practices. These include the offices of Frank O. Gehry, Peter Cook and Colin Fournier, Anthony Hunt Associates, Peter Hubner, Szyskowitz-Kowalski, and Faulkner Brown. All these examples show what architects need to know and the skills they need to acquire to use advanced CAD technology.
The Contemporary Art Scene in Syria: Social Critique and an Artistic Movement (Routledge Advances in Art and Visual Studies)
by Charlotte BankThis book focuses on the expanding contemporary art scene in Syria, particularly Damascus, during the first decade of the twenty-first century. The decade was characterized by a high degree of experimentation as young artists began to work with artistic media that were new in Syria, such as video, installation and performance art. They were rethinking the role of artists in society and looking for ways to reach audiences in a more direct manner and address socio-cultural and socio-political issues. The Contemporary Art Scene in Syria will be of interest to scholars of global and Middle Eastern art studies, and also to scholars interested in the recent social and cultural history of Syria and the wider Middle East.
Contemporary Artificial Intelligence (Chapman And Hall/crc Artificial Intelligence And Robotics Ser.)
by Richard E. NeapolitanThe notion of artificial intelligence (AI) often sparks thoughts of characters from science fiction, such as the Terminator and HAL 9000. While these two artificial entities do not exist, the algorithms of AI have been able to address many real issues, from performing medical diagnoses to navigating difficult terrain to monitoring possible failures
Contemporary Coding Techniques and Applications for Mobile Communications
by Onur Osman Osman Nuri UcanModern error control coding methods based on turbo coding have essentially solved the problem of reliable data communications over noisy channels. Contemporary Coding Techniques and Applications for Mobile Communications provides a clear, comprehensive, and practical grounding on the subject matter, examining the fundamentals, theory, and ap
Contemporary Complex Systems and Their Dependability: Proceedings Of The Thirteenth International Conference On Dependability And Complex Systems Depcos-relcomex. July 2 - 6, 2018, Brunów, Poland (Advances In Intelligent Systems And Computing #761)
by Tomasz Walkowiak Jarosław Sugier Jacek Mazurkiewicz Wojciech Zamojski Janusz KacprzykThis book presents the proceedings of the Thirteenth International Conference on Dependability and Complex Systems (DepCoS-RELCOMEX), which took place in the Brunów Palace in Poland from 2nd to 6th July 2018. The conference has been organized at the Faculty of Electronics, Wrocław University of Science and Technology since 2006, and it continues the tradition of two other events: RELCOMEX (1977–89) and Microcomputer School (1985–95). The selection of papers in these proceedings illustrates the broad variety of topics that are investigated in dependability analyses of today’s complex systems. Dependability came naturally as a contemporary answer to new challenges in the reliability evaluation of these systems. Such systems cannot be considered only as structures (however complex and distributed) built on the basis of technical resources (hardware): their analysis must take into account a unique blend of interacting people (their needs and behaviours), networks (together with mobile properties, cloud-based systems) and a large number of users dispersed geographically and producing an unimaginable number of applications (working online). A growing number of research methods apply the latest advances in artificial intelligence (AI) and computational intelligence (CI). Today’s complex systems are really complex and are applied in numerous different fields of contemporary life.
Contemporary Evolution Strategies (Natural Computing Series)
by Thomas Bäck Christophe Foussette Peter KrauseThis book surveys key algorithm developments between 1990 and 2012, with brief descriptions, a unified pseudocode for each algorithm and downloadable program code. Provides a taxonomy to clarify similarities and differences as well as historical relationships.
Contemporary Experimental Design, Multivariate Analysis and Data Mining: Festschrift in Honour of Professor Kai-Tai Fang
by Jianqing Fan Jianxin PanThe collection and analysis of data play an important role in many fields of science and technology, such as computational biology, quantitative finance, information engineering, machine learning, neuroscience, medicine, and the social sciences. Especially in the era of big data, researchers can easily collect data characterised by massive dimensions and complexity. In celebration of Professor Kai-Tai Fang’s 80th birthday, we present this book, which furthers new and exciting developments in modern statistical theories, methods and applications. The book features four review papers on Professor Fang’s numerous contributions to the fields of experimental design, multivariate analysis, data mining and education. It also contains twenty research articles contributed by prominent and active figures in their fields. The articles cover a wide range of important topics such as experimental design, multivariate analysis, data mining, hypothesis testing and statistical models.
The Contemporary Family in France
by Arnaud Régnier-LoilierThis book provides a portrait of the family in France today, revealing many of the deep-seated, demographic changes that have affected French society in recent decades. It first focuses on conjugal and family trajectories, examining union formation, types of union, entry into parenthood, influence of religion, and separation. Next, the book explores domestic organization within the couple. It looks at gender differences in attitudes to task-sharing, division of household and parenting tasks, influence of past partnership history, and changes after a birth. The book presents a series of studies based on the French version of the international Generations and Gender Survey, a major comparative research project conducted in 20 countries to collect information from individuals aged 18-79 about relationships and processes in the life course. Inside, readers will find insightful analysis of the survey results by sociologists, demographers, and economists, and come to better understand recent demographic and social developments in France as well as the factors influencing them. The book will appeal to a broad audience of students and researchers interested in family, gender, and intergenerational relations. In addition, as the survey data are comparable across countries, the book will provide researchers with ideas for further research opportunities in Europe and beyond.
Contemporary Fuzzy Logic: A Perspective of Fuzzy Logic with Scilab (Big and Integrated Artificial Intelligence #1)
by Stefania Tomasiello Witold Pedrycz Vincenzo LoiaThis book offers an essential introduction to fuzzy logic, starting with the classical notions and going through more advanced notions from the current state-of-the-art research. Each of the major topics is accompanied by examples, problems and Scilab codes. As a free open source software, Scilab offers everyone the chance to practice the concepts learned through the book. The book represents a synthesis of authors’ research and experience through the lectures delivered to university students. It is primarily intended as a textbook for upper-level undergraduates and graduates in computer science, mathematics, physics and engineering. It also represents a valuable resource for practitioners and researchers alike, bringing ideas for projects in the broad field of fuzzy logic.
Contemporary Gender Formations in India: In-between Conformity, Dissent and Affect
by Nandini DharThe volume discusses critical issues surrounding the developments in gender movements in the last two decades in India following the Delhi rape case and the ensuing massive protests in December 2012. A critical documentation of some of the key moments surrounding the contemporary gendered formations and radicalisms in South Asia, the chapters span questions of class, caste, sexuality, digital feminisms, and conflict zones. The book looks at anger, protest, and imaginations of resistance. It showcases the ‘new’ visibility that digital spaces have opened up to lend voice to survivors who are let down by traditional justice mechanisms and raises questions regarding ‘individualized’ modes of seeking justice as against traditional ‘collective’ voices that have always been a hallmark of movements. The volume analyses and criticizes the complicity of the state and the court as agents of reinforcing gender violence – an issue that has not been theorized enough by activists and scholars of violence. Further, it also delves into the #MeToo movement and the LoSHA, as both have raised contentious, controversial, and often conflicting debates on the nature of addressing sexual harassment, particularly at the workplace. Calling for further debate and discussions of cyberspace, gender justice, sexual violence, male entitlement, and forms of neoliberal feminism, this volume will be of immense interest to scholars and researchers in the areas of women and gender studies, sociology and social theory, gender politics, political theory, democracy, protest movements, politics, media and the internet, political advocacy, and law and legal theory. It will also be a compelling read for anyone interested in gender justice and equal rights.
Contemporary High Performance Computing: From Petascale toward Exascale (Chapman & Hall/CRC Computational Science)
by Jeffrey S. VetterContemporary High Performance Computing: From Petascale toward Exascale focuses on the ecosystems surrounding the world’s leading centers for high performance computing (HPC). It covers many of the important factors involved in each ecosystem: computer architectures, software, applications, facilities, and sponsors. The first part of the book examines significant trends in HPC systems, including computer architectures, applications, performance, and software. It discusses the growth from terascale to petascale computing and the influence of the TOP500 and Green500 lists. The second part of the book provides a comprehensive overview of 18 HPC ecosystems from around the world. Each chapter in this section describes programmatic motivation for HPC and their important applications; a flagship HPC system overview covering computer architecture, system software, programming systems, storage, visualization, and analytics support; and an overview of their data center/facility. The last part of the book addresses the role of clouds and grids in HPC, including chapters on the Magellan, FutureGrid, and LLGrid projects. With contributions from top researchers directly involved in designing, deploying, and using these supercomputing systems, this book captures a global picture of the state of the art in HPC.
Contemporary High Performance Computing: From Petascale toward Exascale, Volume 3 (Chapman & Hall/CRC Computational Science)
by Jeffrey S. VetterContemporary High Performance Computing: From Petascale toward Exascale, Volume 3 focuses on the ecosystems surrounding the world’s leading centers for high performance computing (HPC). It covers many of the important factors involved in each ecosystem: computer architectures, software, applications, facilities, and sponsors. This third volume will be a continuation of the two previous volumes, and will include other HPC ecosystems using the same chapter outline: description of a flagship system, major application workloads, facilities, and sponsors. Features: Describes many prominent, international systems in HPC from 2015 through 2017 including each system’s hardware and software architecture Covers facilities for each system including power and cooling Presents application workloads for each site Discusses historic and projected trends in technology and applications Includes contributions from leading experts Designed for researchers and students in high performance computing, computational science, and related areas, this book provides a valuable guide to the state-of-the art research, trends, and resources in the world of HPC.
Contemporary High Performance Computing: From Petascale toward Exascale, Volume Two (Chapman And Hall/crc Computational Science Ser.)
by Jeffrey S. VetterHPC is used to solve a number of complex questions in computational and data-intensive sciences. These questions include the simulation and modeling of physical phenomena, such as climate change, energy production, drug design, global security, and materials design; the analysis of large data sets such as those in genome sequencing, astronomical observation, and cybersecurity; and the intricate design of engineered products, such as airplanes and automobiles.This second volume of Contemporary High Performance Computing: From Petascale toward Exascale continues to document international HPC ecosystems, including the sponsors and sites that host them. Each chapter is punctuated with a site's flagship system and:Presents highlights of applications, workloads, and benchmarksDescribes hardware architectures, system software, and programming systemsExplores storage, visualization, and analyticsExamines the data center/facility as well as system statisticsFeaturing pictures of buildings and systems in production, floorplans, and many block diagrams and charts to illustrate system design and performance, Contemporary High Performance Computing: From Petascale toward Exascale, Volume Two delivers a detailed snapshot of the rich history of practice in modern HPC. This book provides a valuable reference for researchers in HPC and computational science.
Contemporary Issues in Communication, Cloud and Big Data Analytics: Proceedings of CCB 2020 (Lecture Notes in Networks and Systems #281)
by Hiren Kumar Deva Sarma Valentina Emilia Balas Bhaskar Bhuyan Nitul DuttaThis book presents the outcomes of the First International Conference on Communication, Cloud, and Big Data (CCB) held on December 18–19, 2020, at Sikkim Manipal Institute of Technology, Majitar, Sikkim, India. This book contains research papers and articles in the latest topics related to the fields like communication networks, cloud computing, big data analytics, and on various computing techniques. Research papers addressing security issues in above-mentioned areas are also included in the book. The research papers and articles discuss latest issues in the above-mentioned topics. The book is very much helpful and useful for the researchers, engineers, practitioners, research students, and interested readers.
Contemporary Issues in Digital Marketing
by Outi NiininenThis book presents a comprehensive overview of the key topics, best practices, future opportunities and challenges in the Digital Marketing discourse. With contributions from world-renowned experts, the book covers: • Big Data, Artificial Intelligence and Analytics in Digital Marketing • Emerging technologies and how they can enhance User Experience • How ‘digital’ is changing servicescapes • Issues surrounding ethics and privacy • Current and future issues surrounding Social Media • Key considerations for the future of Digital Marketing • Case studies and examples from real-life organisations Unique in its rigorous, research-driven and accessible approach to the subject of Digital Marketing, this text is valuable supplementary reading for advanced undergraduate and postgraduate students studying Digital and Social Media Marketing, Customer Experience Management, Digital Analytics and Digital Transformation.
Contemporary Issues in Exploratory Data Mining in the Behavioral Sciences: Contemporary Issues In Exploratory Data Mining In The Behavioral Sciences (Quantitative Methodology Series)
by John J. McArdle Gilbert RitschardThis book reviews the latest techniques in exploratory data mining (EDM) for the analysis of data in the social and behavioral sciences to help researchers assess the predictive value of different combinations of variables in large data sets. Methodological findings and conceptual models that explain reliable EDM techniques for predicting and understanding various risk mechanisms are integrated throughout. Numerous examples illustrate the use of these techniques in practice. Contributors provide insight through hands-on experiences with their own use of EDM techniques in various settings. Readers are also introduced to the most popular EDM software programs. A related website at http://mephisto.unige.ch/pub/edm-book-supplement/offers color versions of the book’s figures, a supplemental paper to chapter 3, and R commands for some chapters. The results of EDM analyses can be perilous – they are often taken as predictions with little regard for cross-validating the results. This carelessness can be catastrophic in terms of money lost or patients misdiagnosed. This book addresses these concerns and advocates for the development of checks and balances for EDM analyses. Both the promises and the perils of EDM are addressed. Editors McArdle and Ritschard taught the "Exploratory Data Mining" Advanced Training Institute of the American Psychological Association (APA). All contributors are top researchers from the US and Europe. Organized into two parts--methodology and applications, the techniques covered include decision, regression, and SEM tree models, growth mixture modeling, and time based categorical sequential analysis. Some of the applications of EDM (and the corresponding data) explored include: selection to college based on risky prior academic profiles the decline of cognitive abilities in older persons global perceptions of stress in adulthood predicting mortality from demographics and cognitive abilities risk factors during pregnancy and the impact on neonatal development Intended as a reference for researchers, methodologists, and advanced students in the social and behavioral sciences including psychology, sociology, business, econometrics, and medicine, interested in learning to apply the latest exploratory data mining techniques. Prerequisites include a basic class in statistics.
Contemporary Issues in Group Decision and Negotiation: 21st International Conference on Group Decision and Negotiation, GDN 2021, Toronto, ON, Canada, June 6–10, 2021, Proceedings (Lecture Notes in Business Information Processing #420)
by Danielle Costa Morais Liping Fang Masahide HoritaThis book constitutes the refereed proceedings of the 21st International Conference on Group Decision and Negotiation, GDN 2021, which was planned to be held in Toronto, ON, Canada, during June 6–10, 2021. The conference was held virtually due to the COVID-19 pandemic.The field of Group Decision and Negotiation focuses on decision processes with at least two participants and a common goal but conflicting individual goals. Research areas of Group Decision and Negotiation include electronic negotiations, experiments, the role of emotions in group decision and negotiations, preference elicitation and decision support for group decisions and negotiations, and conflict resolution principles. The 12 full papers presented in this volume were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: pandemic responses; preference modeling for group decision and negotiation; conflict resolution; and collaborative decision making processes.