- Table View
- List View
Zenobia July
by Lisa BunkerThe critically acclaimed author of Felix Yz crafts a bold, heartfelt story about a trans girl solving a cyber mystery and coming into her own. <P><P>Zenobia July is starting a new life. She used to live in Arizona with her father; now she's in Maine with her aunts. She used to spend most of her time behind a computer screen, improving her impressive coding and hacking skills; now she's coming out of her shell and discovering a community of friends at Monarch Middle School. People used to tell her she was a boy; now she's able to live openly as the girl she always knew she was. <P><P>When someone anonymously posts hateful memes on her school's website, Zenobia knows she's the one with the abilities to solve the mystery, all while wrestling with the challenges of a new school, a new family, and coming to grips with presenting her true gender for the first time. Timely and touching, Zenobia July is, at its heart, a story about finding home.
Zenoss Core 3.x Network and System Monitoring
by Michael BadgerThe book starts by covering installation and configuration, before moving on to administration and dashboard usage. It contains step-by-step instructions for setting up and using a working, capable Zenoss system. This book is written primarily for network and systems administrators who are monitoring their IT assets with Zenoss Core or who plan to monitor them. In reality, this book will benefit anyone, regardless of job title, who recognizes the importance of proactively monitoring the servers, routers, computers, websites, and devices that connect companies to customers.
Zenoss Core Network and System Monitoring
by Michael BadgerThe book starts by covering installation and configuration, before moving onto administration and dashboard usage.The book contains step-by-step instructions for setting up and using a working, capable Zenoss system. From small business to a large enterprise, this books helps organizations collect data, monitor, and report on their IT assets. Zenoss Core offers a feature-rich, accessible solution to organizations that lack the financial resources to purchase a proprietary monitoring solution or the technical resources. This book makes no distinction about your existing systems management knowledge or lack; thereof and assumes everyone is new to Zenoss Core. The emphasis is on configuring and administering a monitoring environment from the comforts of a graphical web interface.
The Zephyr Conspiracy (Level Up)
by Israel KeatsIn a virtual reality treasure hunt game, a gamer named Gadget is a steampunk pirate looking for her captain's lost treasure—a mysterious mechanical device. If she can find the scattered pieces that make up the device, she'll be released from the game. But the further she gets into it, the more Gadget worries she's in over her head. In a game where it's hard to know who's a real person and who's a non-player character, can Gadget trust anyone?
Zephyr RTOS Embedded C Programming: Using Embedded RTOS POSIX API
by Andrew EliaszThese days the term Real-Time Operating System (RTOS) is used when referring to an operating system designed for use in embedded microprocessors or controllers. The “Real Time” part refers to the ability to implement applications that can rapidly responding to external events in a deterministic and predictable manner. RTOS-based applications have to meet strict deadline constraints while meeting the requirements of the application. One way of ensuring that urgent operations are handled reliably is to set task priorities on each task and to assign higher priorities to those tasks that need to respond in a more timely manner.Another feature of real-time applications is the careful design and implementation of the communication and synchronization between the various tasks. The Zephyr RTOS was developed by Wind River Systems, and subsequently open sourced. Its design and implementation are oriented towards the development of time critical IoT (Internet of Things) and IIoT (Industrial Internet of Things) applications, and, consequently it has a rich feature set for building both wireless and wired networking applications. However, with a rich feature set comes a fairly steep learning curve.This book covers the foundations of programming embedded systems applications using Zephyr's Kernel services. After introducing the Zephyr architecture as well as the Zephyr build and configuration processes, the book will focus on multi-tasking and inter-process communication using the Zephyr Kernel Services API. By analogy with embedded Linux programming books, this book will be akin a Linux course that focuses on application development using the Posix API. In this case, however, it will be the Zephyr Kernel Services API that will be the API being used as well as the Posix API features supported by Zephyr.What You’ll learnAn Overview of the Cortex-M Architecture.Advanced data structures and algorithms programming (linked lists, circular buffers and lists).How to build Zephyr Applications, including setting up a Command Line Zephyr Development Environment on Linux.Task scheduling and pre-emption patterns used in Real Time Operating Systems.Scheduling, Interrupts and Synchronization, including threads, scheduling, and system threads.Overview of Symmetric Multiprocessing (SMP) and Zephyr support for SMP. Memory management, including memory heaps, memory slabs, and memory pools.Who This Book Is ForEmbedded Systems programmers, IoT and IIoT developers, researchers, BLE application developers (Industrial Control Systems, Smart Sensors, Medical Devices, Smart Watches, Manufacturing, Robotics). Also of use to undergraduate and masters in computer science and digital electronics courses.
Zero Comments: Blogging and Critical Internet Culture (Kultur- Und Medientheorie Ser.)
by Geert LovinkIn Zero Comments, internationally renowned media theorist and 'net critic' Geert Lovink revitalizes worn out concepts about the Internet and interrogates the latest hype surrounding blogs and social network sites. In this third volume of his studies into critical Internet culture, following the influential Dark Fiber and My First Recession, Lovink develops a 'general theory of blogging.' He unpacks the ways that blogs exhibit a 'nihilist impulse' to empty out established meaning structures. Blogs, Lovink argues, are bringing about the decay of traditional broadcast media, and they are driven by an in-crowd dynamic in which social ranking is a primary concern. The lowest rung of the new Internet hierarchy are those blogs and sites that receive no user feedback or 'zero comments'. Zero Comments also explores other important changes to Internet culture, as well, including the silent globalization of the Net in which the West is no longer the main influence behind new media culture, as countries like India, China and Brazil expand their influence and looks forward to speculate on the Net impact of organized networks, free cooperation and distributed aesthetics.
Zero Configuration Networking: The Definitive Guide
by Daniel H Steinberg Stuart CheshireIt used to be that two laptops, sitting side by side, couldn't communicate with each other; they may as well have been a thousand miles apart. But that was then, before the advent of Zero Configuration Networking technology. This amazing cross-platform open source technology automatically connects electronic devices on a network, allowing them to interoperate seamlessly-without any user configuration. So now you don't have to lift a finger! Needless to say, it has completely changed the way people connect to devices and programs for printing, file sharing, and other activities. Zero Configuration Networking: The Definitive Guide walks you through this groundbreaking network technology, with a complete description of the protocols and ways to implement network-aware applications and devices. Written by two Zero Configuration Networking experts, including one of Apple's own computer scientists, the book covers more than just file sharing and printing. Zero Configuration Networking also enables activities such as music and photo sharing and automatic buddy discovery on Instant Messaging applications. In fact, Zero Configuration Networking can be used for virtually any device that can be controlled by a computer. And this handy guide has the inside scoop on all of its capabilities-and how you can easily apply them in your own environment. For the technically advanced, Zero Configuration Networking: The Definitive Guide examines the three core technologies that make up Zero Configuration Networking: Link-Local Addressing, Multicast DNS, and DNS Service Discovery. It also reviews a series of APIs, including C-API, Java API, CFNetServices, and Cocoa's NSNetServices. Whether you want to understand how iTunes works, or you want to network a series of laptops and other devices at your office for maximum efficiency, you'll find all the answers in this authoritative guide.
Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits
by Andy Bogart Lillian AblonZero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.
Zero to AI: A non-technical, hype-free guide to prospering in the AI era
by Gianluco Mauro Nicolo ValigiSummary How can artificial intelligence transform your business? In Zero to AI, you&’ll explore a variety of practical AI applications you can use to improve customer experiences, optimize marketing, help you cut costs, and more. In this engaging guide written for business leaders and technology pros alike, authors and AI experts Nicolò Valigi and Gianluca Mauro use fascinating projects, hands-on activities, and real-world explanations to make it clear how your business can benefit from AI. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology There&’s no doubt that artificial intelligence has made some impressive headlines recently, from besting chess and Go grand masters to producing uncanny deep fakes that blur the lines of reality. But what can AI do for you? If you want to understand how AI will impact your business before you invest your time and money, this book is for you. About the book Zero to AI uses clear examples and jargon-free explanations to show the practical benefits of AI. Each chapter explores a real-world case study demonstrating how companies like Google and Netflix use AI to shape their industries. You begin at the beginning, with a primer on core AI concepts and realistic business outcomes. To help you prepare for the transition, the book breaks down a successful AI implementation, including advice on hiring the right team and making decisions about resources, risks, and costs. What's inside Identifying where AI can help your organization Designing an AI strategy Evaluating project scope and business impact Using AI to boost conversion rates, curate content, and analyze feedback Understanding how modern AI works and what it can/can&’t do About the reader For anyone who wants to gain an understanding of practical artificial intelligence and learn how to design and develop projects with high business impact. About the author Gianluca Mauro and Nicolò Valigi are the cofounders of AI Academy, a company specializing in AI trainings and consulting. Table of Contents: 1. An introduction to artificial intelligence PART 1 - UNDERSTANDING AI 2. Artificial intelligence for core business data 3. AI for sales and marketing 4. AI for media 5. AI for natural language 6. AI for content curation and community building PART 2 - BUILDING AI 7. Ready—finding AI opportunities 8. Set—preparing data, technology, and people 9. Go—AI implementation strategy 10. What lies ahead
Zero-trust – An Introduction (River Publishers Rapids Series in Digital Security and Forensics)
by Tom MadsenThe book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies: Cloud Networking Identity management Operational Technology (OT) 5G Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.
Zero Trust and Third-Party Risk: Reduce the Blast Radius
by Gregory C. RasnerDramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you’ll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk. The author uses the story of a fictional organization—KC Enterprises—to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You’ll also find: Explanations of the processes, controls, and programs that make up the zero trust doctrine Descriptions of the five pillars of implementing zero trust with third-party vendors Numerous examples, use-cases, and stories that highlight the real-world utility of zero trustAn essential resource for board members, executives, managers, and other business leaders, Zero Trust and Third-Party Risk will also earn a place on the bookshelves of technical and cybersecurity practitioners, as well as compliance professionals seeking effective strategies to dramatically lower cyber risk.
The Zero Trust Framework: Threat Hunting & Quantum Mechanics
by Ravindra DasThe Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not they will participate. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
The Zero Trust Framework and Privileged Access Management (PAM)
by Ravindra DasThis book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure.However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.
Zero Trust Journey Across the Digital Estate
by Abbas Kudrati Binil A. Pillai"Zero Trust is the strategy that organizations need to implement to stay ahead of cyber threats, period. The industry has 30 plus years of categorical failure that show us that our past approaches, while earnest in their efforts have not stopped attackers. Zero Trust strategically focuses on and systematically removes the power and initiatives hackers and adversaries need to win as they circumvent security controls. This book will help you and your organization have a better understanding of what Zero Trust really is, it's history, and to gain prescriptive knowledge that will help you and your business finally begin beating the adversaries in the chess match that is cyber security strategy." Dr. Chase Cunningham (aka Dr. Zero Trust), Cyberware Expert Today’s organizations require a new security approach that effectively adapts to the challenges of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they are located. Zero Trust is increasingly becoming the critical security approach of choice for many enterprises and governments; however, security leaders often struggle with the significant shifts in strategy and architecture required to holistically implement Zero Trust. This book seeks to provide an end-to-end view of the Zero Trust approach across organizations’ digital estates that includes strategy, business imperatives, architecture, solutions, human elements, and implementation approaches that could enhance these organizations' success in learning, adapting, and implementing Zero Trust. The book concludes with a discussion of the future of Zero Trust in areas such as artificial intelligence, blockchain technology, operational technology (OT), and governance, risk, and compliance. The book is ideal for business decision makers, cybersecurity leaders, security technical professionals, and organizational change agents who want to modernize their digital estate with the Zero Trust approach.
Zero Trust Networks: Building Secure Systems in Untrusted Networks
by Doug Barth Evan GilmanThe perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the principles behind zero trust architecture, along with details necessary to implement it.The Zero Trust Model treats all hosts as if they’re internet-facing, and considers the entire network to be compromised and hostile. By taking this approach, you’ll focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility.Understand how perimeter-based defenses have evolved to become the broken model we use todayExplore two case studies of zero trust in production networks on the client side (Google) and on the server side (PagerDuty)Get example configuration for open source tools that you can use to build a zero trust networkLearn how to migrate from a perimeter-based network to a zero trust network in production
Zero Trust Networks
by Razi Rais Christina Morillo Evan Gilman Doug BarthThis practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture.Examine fundamental concepts of zero trust security model, including trust engine, policy engine, and context aware agentsUnderstand how this model embeds security within the system's operation, with guided scenarios at the end of each chapterMigrate from a perimeter-based network to a zero trust network in productionExplore case studies that provide insights into organizations' zero trust journeysLearn about the various zero trust architectures, standards, and frameworks developed by NIST, CISA, DoD, and others
Zero Trust Networks with VMware NSX: Build Highly Secure Network Architectures for Your Data Centers
by Sreejith KeeriyattilSecure your VMware infrastructure against distrusted networks using VMware NSX. This book shows you why current security firewall architecture cannot protect against new threats to your network and how to build a secure architecture for your data center.Author Sreerjith Keeriyattil teaches you how micro-segmentation can be used to protect east-west traffic. Insight is provided into working with Service Composer and using NSX REST API to automate firewalls. You will analyze flow and security threats to monitor firewalls using VMware Log and see how Packet Flow works with VMware NSX micro-segmentation. The information presented in Zero Trust Networks with VMware NSX allows you to study numerous attack scenarios and strategies to stop these attacks, and know how VMware Air Watch can further improve your architecture.What You Will LearnKnow how micro-segmentation works and its benefitsImplement VMware-distributed firewallsAutomate security policies Integrate IPS/IDS with VMware NSXAnalyze your firewall's configurations, rules, and policiesWho This Book Is ForExperienced VMware administrators and security administrators who have an understanding of data center architecture and operations
Zero Trust Security: An Enterprise Guide
by Jason Garbis Jerry W. ChapmanUnderstand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute a journey to Zero Trust while getting more value from your existing enterprise security architecture. After reading this book, you will be ready to design a credible and defensible Zero Trust security architecture for your organization and implement a step-wise journey that delivers significantly improved security and streamlined operations.Zero Trust security has become a major industry trend, and yet there still is uncertainty about what it means. Zero Trust is about fundamentally changing the underlying philosophy and approach to enterprise security—moving from outdated and demonstrably ineffective perimeter-centric approaches to a dynamic, identity-centric, and policy-based approach.Making this type of shift can be challenging. Your organization has already deployed and operationalized enterprise security assets such as Directories, IAM systems, IDS/IPS, and SIEM, and changing things can be difficult. Zero Trust Security uniquely covers the breadth of enterprise security and IT architectures, providing substantive architectural guidance and technical analysis with the goal of accelerating your organization‘s journey to Zero Trust. What You Will Learn Understand Zero Trust security principles and why it is critical to adopt themSee the security and operational benefits of Zero TrustMake informed decisions about where, when, and how to apply Zero Trust security architecturesDiscover how the journey to Zero Trust will impact your enterprise and security architectureBe ready to plan your journey toward Zero Trust, while identifying projects that can deliver immediate security benefits for your organization Who This Book Is ForSecurity leaders, architects, and practitioners plus CISOs, enterprise security architects, security engineers, network security architects, solution architects, and Zero Trust strategists
Zero Trust Sicherheit: Ein Leitfaden für Unternehmen
by Jason Garbis Jerry W. ChapmanVerstehen Sie, wie Zero-Trust-Sicherheit in Ihr Unternehmen integriert werden kann und sollte.Dieses Buch deckt die Komplexität von Unternehmensumgebungen ab und liefert die realistischen Anleitungen und Anforderungen, die Ihr Sicherheitsteam benötigt, um eine Reise zu Zero Trust erfolgreich zu planen und auszuführen und gleichzeitig mehr Wert aus Ihrer bestehenden Unternehmenssicherheitsarchitektur zu ziehen.Nach der Lektüre dieses Buches werden Sie in der Lage sein, eine glaubwürdige und vertretbare Zero-Trust-Sicherheitsarchitektur für Ihr Unternehmen zu entwerfen und eine schrittweise Umstellung zu implementieren, die zu deutlich verbesserter Sicherheit und optimierten Abläufen führt.Zero Trust Sicherheit hat sich zu einem wichtigen Branchentrend entwickelt, und dennoch herrscht immer noch Unsicherheit darüber, was es bedeutet.Bei Zero Trust geht es darum, die zugrundeliegende Philosophie und den Ansatz für die Unternehmenssicherheit grundlegend zu ändern - weg von veralteten und nachweislich ineffektiven perimeterzentrierten Ansätzen hin zu einem dynamischen, identitätszentrierten und richtlinienbasierten Ansatz.Diese Art von Umstellung kann eine Herausforderung sein. Ihr Unternehmen hat bereits Sicherheitsressourcen wie Verzeichnisse, IAM-Systeme, IDS/IPS und SIEM implementiert und in Betrieb genommen, und es kann schwierig sein, dies zu ändern. Zero Trust Sicherheit deckt die gesamte Bandbreite der Unternehmenssicherheit und IT-Architekturen ab und bietet fundierte architektonische Anleitungen und technische Analysen mit dem Ziel, den Weg Ihres Unternehmens zu Zero Trust zu beschleunigen.Was Sie lernen werdenSie verstehen die Sicherheitsprinzipien von Zero Trust und warum es wichtig ist, diese zu übernehmenErkennen der Sicherheits- und Betriebsvorteile von Zero TrustTreffen Sie fundierte Entscheidungen darüber, wo, wann und wie Sie Zero Trust Sicherheitsarchitekturen einsetzenEntdecken Sie, wie sich der Weg zu Zero Trust auf Ihr Unternehmen und Ihre Sicherheitsarchitektur auswirken wirdSie sind in der Lage, Ihre Reise in Richtung Zero Trust zu planen und gleichzeitig Projekte zu identifizieren, die Ihrem Unternehmen unmittelbare Sicherheitsvorteile bringen können.Für wen ist dieses Buch gedacht?Sicherheitsverantwortliche, -architekten und -praktiker sowie CISOs, Sicherheitsarchitekten in Unternehmen, Sicherheitsingenieure, Netzwerksicherheitsarchitekten, Lösungsarchitekten und Zero-Trust-Strategen
Zeroing Neural Networks: Finite-time Convergence Design, Analysis and Applications
by Lin Xiao Lei JiaZeroing Neural Networks Describes the theoretical and practical aspects of finite-time ZNN methods for solving an array of computational problems Zeroing Neural Networks (ZNN) have become essential tools for solving discretized sensor-driven time-varying matrix problems in engineering, control theory, and on-chip applications for robots. Building on the original ZNN model, finite-time zeroing neural networks (FTZNN) enable efficient, accurate, and predictive real-time computations. Setting up discretized FTZNN algorithms for different time-varying matrix problems requires distinct steps. Zeroing Neural Networks provides in-depth information on the finite-time convergence of ZNN models in solving computational problems. Divided into eight parts, this comprehensive resource covers modeling methods, theoretical analysis, computer simulations, nonlinear activation functions, and more. Each part focuses on a specific type of time-varying computational problem, such as the application of FTZNN to the Lyapunov equation, linear matrix equation, and matrix inversion. Throughout the book, tables explain the performance of different models, while numerous illustrative examples clarify the advantages of each FTZNN method. In addition, the book: Describes how to design, analyze, and apply FTZNN models for solving computational problems Presents multiple FTZNN models for solving time-varying computational problems Details the noise-tolerance of FTZNN models to maximize the adaptability of FTZNN models to complex environments Includes an introduction, problem description, design scheme, theoretical analysis, illustrative verification, application, and summary in every chapter Zeroing Neural Networks: Finite-time Convergence Design, Analysis and Applications is an essential resource for scientists, researchers, academic lecturers, and postgraduates in the field, as well as a valuable reference for engineers and other practitioners working in neurocomputing and intelligent control.
ZeroMQ
by Faruk AkgulA practical, step-by-step example-rich tutorial.If you are a C developer who wants to learn about ZeroMQ, this book is for you. It is assumed that the reader has C experience at some level but prior ZeroMQ knowledge is not expected.
ZeroMQ: Messaging for Many Applications
by Pieter Hintjens<p>Discover why ZeroMQ is rapidly becoming the programming framework of choice for exchanging messages between systems. With this practical, fast-paced guide, you’ll learn how to use this lightweight and highly flexible networking tool for message passing in clusters, the cloud, and other multi-system environments. Created by ZeroMQ maintainer Pieter Hintjens and volunteers from the framework’s community, this book takes you on a tour of different real-world applications, with extended examples in C.</p>
Zhang Functions and Various Models
by Yunong Zhang Dongsheng GuoThis book focuses on solving different types of time-varying problems. It presents various Zhang dynamics (ZD) models by defining various Zhang functions (ZFs) in real and complex domains. It then provides theoretical analyses of such ZD models and illustrates their results. It also uses simulations to substantiate their efficacy and show the feasibility of the presented ZD approach (i. e. , different ZFs leading to different ZD models), which is further applied to the repetitive motion planning (RMP) of redundant robots, showing its application potential.
Zhang Time Discretization (ZTD) Formulas and Applications
by Yunong Zhang Jinjin GuoThis book aims to solve the discrete implementation problems of continuous-time neural network models while improving the performance of neural networks by using various Zhang Time Discretization (ZTD) formulas.The authors summarize and present the systematic derivations and complete research of ZTD formulas from special 3S-ZTD formulas to general NS-ZTD formulas. These finally lead to their proposed discrete-time Zhang neural network (DTZNN) algorithms, which are more efficient, accurate, and elegant. This book will open the door to scientific and engineering applications of ZTD formulas and neural networks, and will be a major inspiration for studies in neural network modeling, numerical algorithm design, prediction, and robot manipulator control.The book will benefit engineers, senior undergraduates, graduate students, and researchers in the fields of neural networks, computer mathematics, computer science, artificial intelligence, numerical algorithms, optimization, robotics, and simulation modeling.
The Zimbabwean Crisis after Mugabe: Multidisciplinary Perspectives (Routledge Contemporary Africa)
by Tendai MangenaThis book examines the ways in which political discourses of crisis and ‘newness’ are (re)produced, circulated, naturalised, received and contested in Post-Mugabe Zimbabwe. Going beyond the ordinariness of conventional political, human and social science methods, the book offers new and engaging multi-disciplinary approaches that treat discourse and language as important sites to encounter the politics of contested representations of the Zimbabwean crisis in the wake of the 2017 coup. The book centres discourse on new approaches to contestations around the discursive framing of various aspects of the socio-economic and political crisis related to significant political changes in Zimbabwe post-2017. Contributors in this volume, most of whom experienced the complex transition first-hand, examine some of the ways in which language functions as a socio-cultural and political mechanism for creating imaginaries, circulating, defending and contesting conceptions, visions, perceptions and knowledges of the post-Mugabe turn in the Zimbabwean crisis and its management by the "New Dispensation". This book will be of interest to scholars of African studies, postcolonial studies, language/discourse studies, African politics and culture.