- Table View
- List View
Unjust: Social Justice and the Unmaking of America
by Noah Rothman"An elegant and thoughtful dismantling of perhaps the most dangerous ideology at work today." — BEN SHAPIRO, bestselling author and host of "The Ben Shapiro Show" "Reading Noah Rothman is like a workout for your brain." — DANA PERINO, bestselling author and former press secretary to President George W. Bush There are just two problems with “social justice”: it’s not social and it’s not just. Rather, it is a toxic ideology that encourages division, anger, and vengeance. In this penetrating work, Commentary editor and MSNBC contributor Noah Rothman uncovers the real motives behind the social justice movement and explains why, despite its occasionally ludicrous public face, it is a threat to be taken seriously. American political parties were once defined by their ideals. That idealism, however, is now imperiled by an obsession with the demographic categories of race, sex, ethnicity, and sexual orientation, which supposedly constitute a person’s “identity.” As interest groups defined by identity alone command the comprehensive allegiance of their members, ordinary politics gives way to “Identitarian” warfare, each group looking for payback and convinced that if it is to rise, another group must fall. In a society governed by “social justice,” the most coveted status is victimhood, which people will go to absurd lengths to attain. But the real victims in such a regime are blind justice—the standard of impartiality that we once took for granted—and free speech. These hallmarks of American liberty, already gravely compromised in universities, corporations, and the media, are under attack in our legal and political systems.
The Unknown Component Problem
by Alberto Sangiovanni-Vincentelli Alan Mishchenko Alexandre Petrenko Tiziano Villa Robert K. Brayton Nina YevtushenkoThe Problem of the Unknown Component: Theory and Applications addresses the issue of designing a component that, combined with a known part of a system, conforms to an overall specification. The authors tackle this problem by solving abstract equations over a language. The most general solutions are studied when both synchronous and parallel composition operators are used. The abstract equations are specialized to languages associated with important classes of automata used for modeling systems. The book is a blend of theory and practice, which includes a description of a software package with applications to sequential synthesis of finite state machines. Specific topologies interconnecting the components, exact and heuristic techniques, and optimization scenarios are studied. Finally the scope is enlarged to domains like testing, supervisory control, game theory and synthesis for special omega languages. The authors present original results of the authors along with an overview of existing ones.
Unleash Core Data: Fetching Data, Migrating, and Maintaining Persistent Stores
by Avi TsadokCreate apps with rich capabilities to receive, process, and intelligently store data that work across multiple devices in the Apple ecosystem. This book will show you how to organize your app's data and make it work for you and your users! With many frameworks, there’s a point in the learning curve where you stop fearing the mountain of knowledge to learn and just enjoy the power to play and develop. For some reason many developers feel that point seems harder to reach with Core Data. And that’s unjustified—Core Data is a great framework that with powerful, optimized tools right out of the box. So it's time you stopped fearing the journey and took your steps further out into the world of enjoying the power of Core Data.With what you learn, you can build apps to deal with a large amount of data and complex relationships in intelligent and efficient ways. Core Data has many secrets underneath the hood that can power up your persistent store like never before. Tools such as Undo, objects deletion, migration, and more. Set up your store and your data model, handle objects with a multi-threading environment, write integration tests, and share your data with an Apple Watch app and iCloud.What You'll LearnWork with Core Data objects across apps and platformsWrite integration tests with your persistent storeFetch, organize, write, and process data efficiently and intelligentlyWho This Book Is ForExperienced iOS developers with Swift knowledge creating iOS apps that require saving complex data on the device other than a few numbers or text.
Unleashing The Power of ChatGPT: A Real World Business Applications
by Charles WaghmareExplore the role ChatGPT can play in business, including operations, marketing, sales, and delivery. This concise book illustrates how ChatGPT is changing the way individuals interact with machines and how you can take advantage of its capabilities for business. The book starts with an overview of ChatGPT and its impact in the realm of of conversational AI. You will then dive into the technical aspects of ChatGPT and gain an understanding of how machine learning algorithms and natural language processing work in the background. Various business applications of ChatGPT are then discussed, followed by how it can get integrated into your business operations. To wrap things up, you will gain insight into the data and privacy elements that need to be considered while using ChatGPT, and how to maintain its integrity. After completing this book, you will understand the ChatGPT framework and how to integrate it into your own ventures. What You Will Learn Understand the various technologies and techniques utilized in ChatGPTGain insight into the future of human-machine interactionAnalyze the advantages and disadvantages of ChatGPT for your industryExplore the ethical implications of using AI Who This Book Is For Tech enthusiasts who are passionate about artificial intelligence (AI), machine learning, and human-machine interaction.
Unleashing the Art of Digital Forensics
by Keshav Kaushik Rohit Tanwar Susheela Dahiya Komal Kumar Bhatia Yulei WuUnleashing the Art of Digital Forensics is intended to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector. Key Features: • Discusses the recent advancements in Digital Forensics and Cybersecurity • Reviews detailed applications of Digital Forensics for real-life problems • Addresses the challenges related to implementation of Digital Forensics and Anti-Forensic approaches • Includes case studies that will be helpful for researchers • Offers both quantitative and qualitative research articles, conceptual papers, review papers, etc. • Identifies the future scope of research in the field of Digital Forensics and Cybersecurity. This book is aimed primarily at and will be beneficial to graduates, postgraduates, and researchers in Digital Forensics and Cybersecurity.
Unleashing the Power of Data with Trusted AI: A guide for board members and executives
by Wendy Turner-WilliamsDiscover the transformative potential of AI for data-driven decision-making and fast-track your organization's growth journey with trusted AI implementationKey FeaturesGain comprehensive insights and analyses to make quick and accurate decisionsLearn to integrate trusted AI into your organizational workflows and decision-making processesExplore real-world case studies that showcase the transformative impact of AI in diverse industriesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionWritten by a distinguished leader and innovator who has been instrumental in spearheading digital, cloud, and AI transformations across global brands, Unleashing the Power of Data with Trusted AI is an indispensable resource that will make you AI-ready. This comprehensive guide is designed to meet the urgent need for clarity and to give you actionable insights into today's rapidly evolving landscape of AI and its fundamental driver - data. You’ll delve into the exciting world of AI and its integration with data, uncover its significance, ethical considerations, and strategic applications with real-life success stories from industry giants like Starbucks, Netflix, and Siemens. You’ll also witness first-hand how the integration of data and AI has reshaped markets and elevated customer experiences, and discover the future of generative AI based on several surveys and case studies. You’ll gain an understanding of how AI has evolved across industries, empowering decision-making and fostering innovation. Tailored for board members, executives, innovators, and tech enthusiasts, this immersive guide will reshape your understanding of data and AI synergy. By the end of this guide, you’ll be able to lead your teams, customers, partners, and organizations confidently and responsibly in the era of AI.What you will learnNavigate ethical considerations and comply with data regulations effectivelyElevate data quality and enhance data literacy within your organizationCraft effective AI strategies for data analytics processesExplore real-world case studies showcasing the tangible benefits of trusted AIOptimize decision-making processes by harnessing AI-driven insightsWho this book is forThis report is for executives and board members of mid to large enterprises, such as CDAIOs, CTOs, CIOs, CISOs, CPOs, and CEOs, as well as AI, data, ethics, privacy, and security professionals. With this book, you’ll confidently develop your data and AI implementation strategy and navigate the complex landscape of emerging technologies with clarity.
Unleashing the Power of IT
by Dan RobertsGo from the "IT guy" to trusted business partnerIf you're in IT, quite a lot is expected of you and your team: be technologically advanced, business-minded, customer-focused, and financially astute, all at once. In the face of unforgiving competition, rampant globalization, and demanding customers, business leaders are discovering that it's absolutely essential to have a strong, active partner keeping a firm hand on the decisions and strategies surrounding information technology. Unleashing the Power of IT provides tangible, hard-hitting, real-world strategies, techniques, and approaches that will immediately transform your IT workforce and culture, presenting the new mindset, skill set, and tool set necessary for IT leaders to thrive in today's challenging environment.Includes new discussion on social mediaOffers online access to the IT Skill Builder Competency Assessment ToolFeatures top ten lists of tips and techniques, proven frameworks, and practical guidance to help you launch and sustain your IT culture change and professional development initiativesProfiling several world-class organizations that have implemented the principles in this book, Unleashing the Power of IT reveals the best practices to get you on the path to implementation.
Unleugbare Daten und digitale Währungen: Blockchain und Bitcoin im Vergleich zum S-Netzwerk mit dem Einweg-Bezugsmittel Jad
by Johannes ViehmannAlte und neue Kryptowährungen: In diesem Buch erfahren Sie alles über alternative WirtschaftssystemeIm Zeitalter der Digitalisierung scheint alles möglich: Produktionen werden automatisiert, die Welt ist miteinander vernetzt und Transaktionen erfolgen nicht mehr nur durch materielles Geld, sondern durch digitale Kryptowährungen. In diesem Buch von Johannes Viehmann werden Ihnen daher unter anderem folgende Begriffe begegnen:BlockchainBitcoin PrimecoinEthereumetc.Sie erhalten einen ersten Eindruck von den aktuell häufig genutzten Kryptowährungen und ihrer Entwicklung in den letzten Jahren. Dank der anschaulichen Darstellung des Inhaltes eignet sich dieses Buch für alle, die ihr Wissen zu digitalen Währungen erweitern und kreativ über die bereits realisierten Kryptowährungen hinausdenken möchten.Das Buch zeigt, wie eine hypothetische ideale Kryptowährung aussehen müssteWie bei allen Geldmitteln kann es auch bei digitalen Währungen zu einer Finanzkrise kommen. Probleme liegen in der Stabilität der Kaufkraft der Kryptowährung und bei der Skalierbarkeit ihrer Transaktionssysteme. Der Autor geht in seinem Buch daher der Frage auf den Grund, wie derlei negative Eigenschaften verhindert werden können und wo die Schwierigkeiten liegen, einer idealen Kryptowährung nahe zu kommen.Das Buch bietet Ihnen eine Alternative, die der Autor selbst auf Basis der Blockchain entwickelt hat: Jad. Dieses Einweg-Nutzmittel könnte auf einem S-Netzwerk zu einer Sammlung von unleugbaren Daten führen. In sieben Kapiteln werden Sie (auch als Anfänger) problemlos in die Welt der Kryptowährungen eingeführt. Das Buch hilft Ihnen zudem dabei, den Zusammenhang zwischen Bitcoin und unleugbaren Daten zu erkennen. Sie lernen mehr über Vertrauenskonzepte, Transaktionen, Technologien und neue digitale Währungen.
Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications
by Yan Zhang Laurence T. Yang Jianhua MaThe goal of Unlicensed Mobile Access (UMA) is to provide seamless access to GSM and GPRS mobile service networks via unlicensed spectrum technologies, including Bluetooth, WiMAX, and Wi-Fi. Expanding on the level of knowledge in this growing field, Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards, and Applications
Unlocked: The Real Science of Screen Time (and how to spend it better)
by Pete Etchells'A welcome counterpoint to the technopanic that screen time is causing a mental health crisis' Bruce Hood 'A rare mix of trustworthy science, practical advice, and human stories ... I'm going to recommend it to all the parents I know, and keep it handy for reference next time I see a scary headline about how technology is ruining our lives' Timandra HarknessMost of us spend a significant part of the day in front of a screen. Our work and social lives play out through our computers, tablets and phones: on email, social media, video conference calls and gaming servers. But what is all this screen time doing to our health, our sleep, and our relationships?Professor Pete Etchells studies the way we use screens, and how they can affect us. In UNLOCKED, he delves into the real science behind the panic about our alleged device addiction and withering attention spans. Armed with the latest research, he reveals how little we have to fear, and the great deal we have to gain, by establishing a more positive relationship with our screens. That begins with asking ourselves some essential questions about how we use them.Instead of clamouring for us to ditch our devices (before guiltily returning to the same old habits), UNLOCKED is a sustainable, realistic and vital guide to transforming our connection with technology.
Unlocked: The Real Science of Screen Time (and how to spend it better)
by Pete Etchells'A welcome counterpoint to the technopanic that screen time is causing a mental health crisis' Bruce Hood 'A rare mix of trustworthy science, practical advice, and human stories ... I'm going to recommend it to all the parents I know, and keep it handy for reference next time I see a scary headline about how technology is ruining our lives' Timandra HarknessMost of us spend a significant part of the day in front of a screen. Our work and social lives play out through our computers, tablets and phones: on email, social media, video conference calls and gaming servers. But what is all this screen time doing to our health, our sleep, and our relationships?Professor Pete Etchells studies the way we use screens, and how they can affect us. In UNLOCKED, he delves into the real science behind the panic about our alleged device addiction and withering attention spans. Armed with the latest research, he reveals how little we have to fear, and the great deal we have to gain, by establishing a more positive relationship with our screens. That begins with asking ourselves some essential questions about how we use them.Instead of clamouring for us to ditch our devices (before guiltily returning to the same old habits), UNLOCKED is a sustainable, realistic and vital guide to transforming our connection with technology.
Unlocked: The Real Science of Screen Time (and how to spend it better)
by Pete Etchells'A welcome counterpoint to the technopanic that screen time is causing a mental health crisis' Bruce Hood'A rare mix of trustworthy science, practical advice, and human stories ... I'm going to recommend it to all the parents I know, and keep it handy for reference next time I see a scary headline about how technology is ruining our lives' Timandra Harkness'Punctures some of the most pernicious myths about our smartphone and screen-dominated lives, while offering good advice about how to improve the time we spend with screens ... a must-read' New ScientistMost of us spend a significant part of the day in front of a screen. Our work and social lives play out through our computers, tablets and phones: on email, social media, video conference calls and gaming servers. But what is all this screen time doing to our health, our sleep, and our relationships?Professor Pete Etchells studies the way we use screens, and how they can affect us. In UNLOCKED, he delves into the real science behind the panic about our alleged device addiction and withering attention spans. Armed with the latest research, he reveals how little we have to fear, and the great deal we have to gain, by establishing a more positive relationship with our screens. That begins with asking ourselves some essential questions about how we use them.Instead of clamouring for us to ditch our devices (before guiltily returning to the same old habits), UNLOCKED is a sustainable, realistic and vital guide to transforming our connection with technology.
Unlocking Agile's Missed Potential
by Robert WebberUNLOCKING AGILE???S MISSED POTENTIAL Agile has not delivered on its promises. The business side expected faster time to market, but they still experience the long delays of bloated releases. Engineers thought they would be given time to build the product right the first time, but they are rushed under pressure to deliver new features within impossible schedules. What went wrong? The culprit is feature-based waterfall release planning perpetuated in a vain attempt to achieve business predictability. Agile didn’t address the business need for multi-year financial predictability. The Agile community’s answer was the naïve response, “The business needs to be more Agile.” Waterfall release planning with fixed schedules undercuts a basic tenet of Agile development – the need to adjust content delivered within a timebox to account for evolving requirements and incorporation of feedback. Agile without flexible content is not Agile. This book introduces a novel solution that enables product teams to deliver higher value within shorter cycle times while meeting the predictability needs of the business. Organizations today want product teams that break down walls between product management and engineering to achieve schedule and financial objectives. Until now they haven’t had a way to implement product teams within the rigid constraints of traditional organizational structures. The Investment planning approach described in this book supports small development increments planned and developed by product teams aligned by common schedule and financial goals. It uses Cost of Delay principles to prioritize work with the highest value and shortest cycle times. Investments provide a vehicle for collaboration and innovation and fulfill the promise of highly motivated self-directed Agile development teams. This book is for engineers, product managers and project managers who want to finally do Agile the way it was envisioned. This book is also for leaders who want to build high-performance teams around the inherent motivational environment of Agile when done right. Foreword by Steve McConnell, author of More Effective Agile: A Roadmap for Software Leaders (Construx Press, 2019).
Unlocking Blockchain on Azure: Design and Develop Decentralized Applications
by Shilpa KarkeraaDesign, architect, and build Blockchain applications with Azure in industrial scenarios to revolutionize conventional processes and data security. This book will empower you to build better decentralized applications that have stronger encryption, better architectures, and effective deployment structures over the cloud. You’ll start with an overview of Blockchain, distributed networks, Azure components in Blockchain, such as Azure Workbench, and independent Blockchain-as-a-service solutions. Next, you’ll move on to aspects of Blockchain transactions where the author discusses encryption and distribution along with practical examples. You’ll cover permissioned Blockchains and distributed ledgers with the help of use cases of financial institutions, followed by code and development aspects of smart contracts. Here, you will learn how to utilise the templates provided by Azure Resource Manager to quickly develop an Ethereum-based smart contract. Further, you will go through Blockchain points of integration, where the author demonstrates enterprise integration, automated processing of smart contracts, and lifecycle events. Finally, you will go through every deployment of HyperLedger, Ethereum, and other decentralized ledger examples over Azure, thus understanding the elements of creation, design, development, security, and deployment. After reading Unlocking Blockchain on Azure you will be able to design and develop Blockchain applications in Azure to decentralize social networks, financial organisations, and data. You’ll be able to implement encryption over a Blockchain and have full control over shared instances digitally. You will be able to program smart contracts to digitize rules and trigger timely transactions.What You Will LearnBuild decentralized applications Program, design, and deploy dynamic smart contractsModel Blockchains in the form of token economics, hybrid networks, and infrastructureDevelop end-to-end encryption and distributed systemsWho This Book Is ForDevelopers and solutions architects who want to develop Blockchain applications in Azure and decentralize applications in different scenarios.
Unlocking The Clubhouse: Women In Computing
by Jane Margolis Allan FisherThe information technology revolution is transforming almost every aspect of society, but girls and women are largely out of the loop. Although women surf the Web in equal numbers to men and make a majority of online purchases, few are involved in the design and creation of new technology. It is mostly men whose perspectives and priorities inform the development of computing innovations and who reap the lion's share of the financial rewards. As only a small fraction of high school and college computer science students are female, the field is likely to remain a "male clubhouse," absent major changes. In Unlocking the Clubhouse, social scientist Jane Margolis and computer scientist and educator Allan Fisher examine the many influences contributing to the gender gap in computing. The book is based on interviews with more than 100 computer science students of both sexes from Carnegie Mellon University, a major center of computer science research, over a period of four years, as well as classroom observations and conversations with hundreds of college and high school faculty.
Unlocking dbt: Design and Deploy Transformations in Your Cloud Data Warehouse
by Cameron Cyr Dustin DorseyThis book shows how dbt is used to build data transformation pipelines that enable dependency management and allow for version control and automated testing. It explains how dbt is revolutionizing data transformation and the advantages that a command-line tool like dbt provides over and above the use of database stored procedures and other ETL and ELT tools that handle data transformations. You’ll see how to create custom-written transformations through simple SQL SELECT statements, eliminating the need for boilerplate code and making it easy to incorporate dbt as the transformation layer in your data warehouse pipelines. Additionally, you will learn how dbt enables data teams to incorporate software engineering best practices such as code reusability, version control, and automated testing into the data transformation process. Unlocking dbt walks you through using dbt to establish a project, build and modularize SQL models, and execute jobs in a way that is easy to maintain and scale as your data ecosystem matures. You’ll begin by establishing and configuring a project, a process covered using both dbt Cloud and dbt Core, so that you can confidently stand up a project using either platform. From there, you’ll move into building transformations with peace of mind that your project will scale appropriately as you continue to develop it. After learning the basics needed to get started, you’ll continue to build on that foundation by looking at the unique ways in which dbt combines SQL with Jinja to take your code beyond what is capable in normal SQL. You will learn about advanced materializations, building lineage in your data flows, the unlimited potential of macros, and so much more. This book also explores supported file types and the building of Python models. Rounding things out, you will learn features of dbt that will assist you in making your transformation layer production ready. These include how to implement automated testing, using dbt to generate documentation, and running CI/CD pipelines. What You Will Learn Understand what dbt is and how it is used in the modern data stackSet up a project using both dbt Cloud and dbt CoreConnect a dbt project to a cloud data warehouseBuild SQL and Python models that are scalable and maintainableConfigure development, testing, and production environmentsCapture reusable logic in the form of Jinja macrosIncorporate version control with your data transformation code Who This Book Is For Current and aspiring data professionals, including architects, developers, analysts, engineers, data scientists, and consultants who are beginning the journey of using dbt as part of their data pipeline’s transformation layer. Readers should have a foundational knowledge of writing basic SQL statements, development best practices, and working with data in an analytical context such as a data warehouse.
Unlocking Financial Data: A Practical Guide to Technology for Equity and Fixed Income Analysts
by Justin PauleyInvestors recognize that technology is a powerful tool for obtaining and interpreting financial data that could give them the one thing everyone on Wall Street wants: an edge. Yet, many don’t realize that you don’t need to be a programmer to access behind-the-scenes financial information from Bloomberg, IHS Markit, or other systems found at most banks and investment firms.This practical guide teaches analysts a useful subset of Excel skills that will enable them to access and interpret financial information—without any prior programming experience. This book will show analysts, step-by-step, how to quickly produce professional reports that combine their views with Bloomberg or Markit data including historical financials, comparative analysis, and relative value. For portfolio managers, this book demonstrates how to create professional summary reports that contain a high-level view of a portfolio’s performance, growth, risk-adjusted return, and composition. If you are a programmer, this book also contains a parallel path that covers the same topics using C#.Topics include:Access additional data that isn’t visible on Bloomberg screensCreate tables containing corporate data that makes it possible to compare multiple companies, bonds, or loans side-by- sideBuild one-page analytic (“Tear Sheet”) reports for individual companies that incorporates important financials, custom notes, relative value comparison of the company to its peers, and price trends with research analyst targetsBuild two-page portfolio summary report that contains a high-level view of the portfolio’s performance, growth, risk-adjusted return, and compositionExplore daily prices and facility information for most of the tradable corporate bond and loan marketDetermine the relationship between two securities (or index) using correlation and regressionCompare each security’s performance to a cohort made of up of securities with similar risk and return characteristicsMeasure portfolio risk-adjusted return by calculating variance, standard deviation, and Sharpe ratioUse Markit data to identify meaningful trends in prices, new issue spreads, and refinancings
Unlocking Strategic Innovation: Competitive Success in a Disruptive Environment
by Surja Datta Sandeep Roy Tobias KutzewskiThis new book explores how firms achieve competitive advantage in a disruptive, digital and globalized business landscape. An integrative framework, ‘The Four Rs of Competitive Success’, is introduced, which covers the four core pillars of global strategy: resources and capabilities, technology and innovation (recombination), internationalization and international markets (reach), and physical and virtual location (roots). It then explains how competitive advantage is achieved through an interaction of these four drivers against the backdrop of a globalized and digitized world. It is uniquely practical in its approach, combining theoretical understanding with international case studies and real-life examples throughout each chapter, including Apple, IKEA and Microsoft. Unlocking Strategic Innovation is concise, applied reading for postgraduate students studying international business, corporate strategy, innovation and digital strategy, as well as academics in the field. It will also be important reading for practitioners looking to gain further understanding of how firms compete and flourish in a global and technology-driven environment.
Unlocking the Gates: How and Why Leading Universities Are Opening Up Access to Their Courses (The William G. Bowen Series #57)
by Taylor WalshHow elite universities are entering the world of online educationOver the past decade, a small revolution has taken place at some of the world's leading universities, as they have started to provide free access to undergraduate course materials—including syllabi, assignments, and lectures—to anyone with an Internet connection. Yale offers high-quality audio and video recordings of a careful selection of popular lectures, MIT supplies digital materials for nearly all of its courses, Carnegie Mellon boasts a purpose-built interactive learning environment, and some of the most selective universities in India have created a vast body of online content in order to reach more of the country's exploding student population. Although they don't offer online credit or degrees, efforts like these are beginning to open up elite institutions—and may foreshadow significant changes in the way all universities approach teaching and learning. Unlocking the Gates is one of the first books to examine this important development.Drawing on a wide range of sources, including extensive interviews with university leaders, Taylor Walsh traces the evolution of these online courseware projects and considers the impact they may have, both inside elite universities and beyond. As economic constraints and concerns over access demand more efficient and creative teaching models, these early initiatives may lead to more substantial innovations in how education is delivered and consumed—even at the best institutions. Unlocking the Gates tells an important story about this form of online learning—and what it might mean for the future of higher education.
Unmanned Aerial Systems in Precision Agriculture: Technological Progresses and Applications (Smart Agriculture #2)
by Zhao Zhang Hu Liu Ce Yang Yiannis Ampatzidis Jianfeng Zhou Yu JiangThis book, consisting of 8 chapters, describes the state-of-the-art technological progress and applications of unmanned aerial vehicles (UAVs) in precision agriculture. It focuses on the UAV application in agriculture, such as crop disease detection, mid-season yield estimation, crop nutrient status, and high-throughput phenotyping. Different from individual papers focusing on a specific application, this book provides a holistic view for readers with a wide range of subjects. In addition to researchers in the areas of plant science, plant pathology, breeding, engineering, it is also intended for undergraduates and graduates who are interested in imaging processing, artificial intelligence in agriculture, precision agriculture, agricultural automation, and robotics.
Unmanned Aerial Vehicle Applications over Cellular Networks for 5G and Beyond (Wireless Networks)
by Hongliang Zhang Lingyang Song Zhu HanThis book discusses how to plan the time-variant placements of the UAVs served as base station (BS)/relay, which is very challenging due to the complicated 3D propagation environments, as well as many other practical constraints such as power and flying speed. Spectrum sharing with existing cellular networks is also investigated in this book. The emerging unmanned aerial vehicles (UAVs) have been playing an increasing role in the military, public, and civil applications. To seamlessly integrate UAVs into future cellular networks, this book will cover two main scenarios of UAV applications as follows. The first type of applications can be referred to as UAV Assisted Cellular Communications.Second type of application is to exploit UAVs for sensing purposes, such as smart agriculture, security monitoring, and traffic surveillance. Due to the limited computation capability of UAVs, the real-time sensory data needs to be transmitted to the BS for real-time data processing. The cellular networks are necessarily committed to support the data transmission for UAVs, which the authors refer to as Cellular assisted UAV Sensing. To support real-time sensing streaming, the authors design joint sensing and communication protocols, develop novel beamforming and estimation algorithms, and study efficient distributed resource optimization methods.This book targets signal processing engineers, computer and information scientists, applied mathematicians and statisticians, as well as systems engineers to carve out the role that analytical and experimental engineering has to play in UAV research and development. Undergraduate students, industry managers, government research agency workers and general readers interested in the fields of communications and networks will also want to read this book.
Unmanned Aerial Vehicles Applications: Challenges and Trends (Synthesis Lectures on Intelligent Technologies)
by Mohamed Abdelkader Anis KoubaaThis is a book that covers different aspects of UAV technology, including design and development, applications, security and communication, and legal and regulatory challenges. The book is divided into 13 chapters, grouped into four parts. The first part discusses the design and development of UAVs, including ROS customization, structured designs, and intelligent trajectory tracking. The second part explores diverse applications such as search and rescue, monitoring distributed parameter systems, and leveraging drone technology in accounting. The third part focuses on security and communication challenges, including security concerns, multi-UAV systems, and communications security. The final part delves into the legal and regulatory challenges of integrating UAVs into non-segregated airspace. The book serves as a valuable resource for researchers, practitioners, and students in the field of unmanned aerial vehicles, providing a comprehensive understanding of UAV technology and its applications.
Unmanned Aerial Vehicles for Internet of Things (IoT): Concepts, Techniques, and Applications
by Vandana Mohindru Yashwant Singh Ravindara Bhatt Anuj Kumar GuptaThe 15 chapters in this book explore the theoretical as well as a number of technical research outcomes on all aspects of UAVs. UAVs has widely differing applications such as disaster management, structural inspection, goods delivery, transportation, localization, mapping, pollution and radiation monitoring, search and rescue, farming, etc. The advantages of using UAVs are countless and have led the way for the full integration of UAVs, as intelligent objects into the IoT system. The book covers cover such subjects as: Efficient energy management systems in UAV based IoT networks IoE enabled UAVs Mind-controlled UAV using Brain-Computer Interface (BCI) The importance of AI in realizing autonomous and intelligent flying IoT Blockchain-based solutions for various security issues in UAV-enabled IoT The challenges and threats of UAVs such as hijacking, privacy, cyber-security, and physical safety.
Unmanned Aerial Vehicles in Smart Cities (Unmanned System Technologies)
by Fadi Al-TurjmanThis book addresses the major challenges in realizing unmanned aerial vehicles (UAVs) in IoT-based Smart Cities. The challenges tackled vary from cost and energy efficiency to availability and service quality. The aim of this book is to focus on both the design and implementation aspects of the UAV-based approaches in IoT-enabled smart cities’ applications that are enabled and supported by wireless sensor networks, 5G, and beyond. The contributors mainly focus on data delivery approaches and their performability aspects. This book is meant for readers of varying disciplines who are interested in implementing the smart planet/environments vision via wireless/wired enabling technologies.Involves the most up to date unmanned aerial vehicles (UAV) assessment and evaluation approachesIncludes innovative operational ideas in agriculture, surveillance, rescue, etc.Pertains researchers, scientists, engineers and practitioners in the field of smart cities, IoT, and communicationsFadi Al-Turjman received his Ph.D. from Queen’s University, Canada. He is a full professor and a research center director at Near East University, Nicosia. He is a leading authority in the area of IoT and intelligent systems. His publication history spans over 250 publications in addition to his editorialship in top journals such as the IEEE Communication Surveys and Tutorials, and the Elsevier Sustaibable Cities and Society.
Unmanned Aerial Vehicles Swarm for Protecting Smart Cities: Future Trends and Challenges
by Oroos Arshi Inam Ullah Khan Keshav Kaushik Nadeem Iqbal Inam Ullah Khadija SlimaniExplore the intersection between unmanned aerial vehicles (UAVs) and the evolving landscape of smart cities. With the increasing integration of technology into urban environments, there is a growing need to understand how UAV swarms can contribute to the safety, efficiency, and resilience of these complex urban ecosystems. The book aims to provide a technical understanding of UAV swarms and their applications within the context of smart cities. It begins by laying the groundwork with an introduction to UAV swarms and smart cities, establishing the foundational concepts and motivations behind their integration. As the book progresses, it delves into various aspects of smart cities, exploring concepts, technologies, and challenges inherent in their development and operation. This includes discussions on cloud computing, cybersecurity, machine learning applications, surveillance and monitoring systems, urban planning, and infrastructure management. It also examines the integration of IoT devices with UAV swarms, highlighting the synergies between these emerging technologies and their potential impact on urban environments. The book examines cutting-edge topics such as edge computing, blockchain applications, 5G integration, and augmented reality/virtual reality (AR/VR) visualization techniques in the context of UAV swarm operations. It concludes with reflections on innovations and future directions, offering insights into the evolving landscape of UAV swarm technologies and their implications for the protection and advancement of smart cities. The book serves as a comprehensive guide for researchers, practitioners, and policymakers interested in understanding the technical, social, and economic dimensions of UAV swarm technology within the context of smart city development and management. What You Will Learn Identify practical applications of UAV swarms in surveillance monitoring, urban planning, disaster management, and infrastructure resilience Gain comprehensive understanding of UAV swarms by exploring diverse disciplines Apply insights from emerging technologies like cloud computing, machine learning, blockchain, IoT devices, and so on to UAV swarm technology Who Is This Book For This book appeals to a wide range of readers with different interests and backgrounds, including researchers, policymakers, industry stakeholders, practitioners, experts, and general fans who are curious in the confluence of smart cities with UAV swarm technologies with little to no experience or knowledge of UAV swarms.