- Table View
- List View
Brilliant Ideas for Using ICT in the Inclusive Classroom (David Fulton / Nasen Ser.)
by Sally McKeown Angela McGlashonRunner up in Teach Secondary’s Technology and Innovation Awards 2014 sponsored by Lego, Brilliant Ideas for using ICT in the Inclusive Classroom provides lots of simple practical ideas showing teachers and support staff how they can use ICT to boost the achievement of all pupils. How can you use ICT to boost the achievement of all your pupils? This practical teachers’ guide will help you to unlock the enormous potential of new technology in order to enhance pupils’ learning, particularly for young people with additional needs. Written by two of the UK’s leading technology experts, this invaluable and newly updated resource will enable you to use ICT effectively to make lessons more accessible, motivating and fun. With fifty illustrated case studies and twenty starter activities, this practical resource will help you to introduce new technology into the inclusive classroom. It has been specifically designed to help develop your pupils’ key skills, such as problem solving, developing concepts and communicating to different audiences. In each activity, the authors show why and how a particular resource was used and show how similar techniques can be implemented to open up the curriculum to your learners. The authors include timely and realistic advice on how to use a range of technologies from the cheap and cheerful – and even free – to more sophisticated and specialist packages. Find out about: Apps Blogging Digital animation Podcasting Digital storytelling Wikis Geocaching Coding Games and gaming Sat nav Art packages Twitter Whether you’re already techno-savvy or looking to get started with ICT, this book is full of brilliant ideas on how to engage learners of all abilities using technology. If you’re looking for inspiration on how to integrate creative uses of ICT with the curriculum, this book will prove invaluable.
Bring Your Own Device Security Policy Compliance Framework (Information Systems Engineering and Management #37)
by Tutut Herawan Rathika Palanisamy Azah Anir Norman Miss Laiha KiahProliferation of Bring Your Own Device (BYOD) has instigated a widespread change, fast outpacing the security strategies deployed by organizations. The influx of these devices has created information security challenges within organizations, further exacerbated with employees&’ inconsistent adherence with BYOD security policy. To prevent information security breaches, compliance with BYOD security policy and procedures is vital. This book aims to investigate the factors that determine employees' BYOD security policy compliance by using mixed methods approach. Security policy compliance factors, BYOD practices and security risks were identified following a systematic review approach. Building on Organizational Control Theory, Security Culture and Social Cognitive Theory, a research framework positing a set of plausible factors determining BYOD security policy compliance was developed. Next, with a purposive sample of eight information security experts from selected public sector organizations, interviews and BYOD risk assessments analysis were performed to furnish in-depth insights into BYOD risks, its impact on organizations and recommend control measures to overcome them. This led to the suggestion of four control measures to mitigate critical BYOD security risks such as Security Training and Awareness (SETA), policy, top management commitment and technical countermeasures. The control measures were mapped into the research framework to be tested in the following quantitative phase. The proposed research framework was tested using survey results from 346 employees of three Critical National Information Infrastructure (CNII) agencies. Using Partial Least Squares – Structural Equation Modelling (PLS-SEM), the framework's validity and reliability were evaluated, and hypotheses were tested. Findings show that perceived mandatoriness, self-efficacy and psychological ownership are influential in predicting employees&’ BYOD security policy compliance. Specification of security policy is associated with perceived mandatoriness, while BYOD IT support and SETA are significant towards self-efficacy. Unexpectedly, security culture has been found to have no significant relationship to BYOD security policy compliance. Theoretical, practical, and methodological contributions were discussed and suggestions for future research were recommended. The analysis led to a number of insightful findings that contribute to the literature and the management, which are predominantly centered on traditional computing. In view of the ever-increasing BYOD threats to the security of government information, it is imperative that IT managers establish and implement effective policies to protect vital information assets. Consequently, the findings of this study may benefit policymakers, particularly in the public sector, in their efforts to increase BYOD security policy compliance among employees.
Bring Your Own Devices (BYOD) Survival Guide
by Jessica KeyesWhere end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own. From laptops and smartphones to iPads and virtually unlimited software apps, end-users have tasted their freedom and love it. IT will simply never be the same.Bri
Bring your own Device - Ein Praxisratgeber: HMD Best Paper Award 2014 (essentials)
by Thorsten WalterThorsten Walter beschreibt die technischen und juristischen Fallstricke sogenannter ,,Bring your own device"-Modelle und stellt die arbeitsrechtlichen Regelungsinstrumente für den Umgang mit BYOD vor. Darüber hinaus werden die verschiedenen technischen Lösungen zur Umsetzung von BYOD im Unternehmen in leicht verständlicher Form einander gegenübergestellt. Der Autor gibt praktische Empfehlungen zur Gestaltung von Regelungen in Nutzungsvereinbarungen.
Bring your own Device: Einsatz von privaten Endgeräten im beruflichen Umfeld – Chancen, Risiken und Möglichkeiten
by Andreas Kohne Sonja Ringleb Cengizhan YücelDas Buch betrachtet das Thema BYOD (Bring your own Device) ganzheitlich - ausgehend von einer Mobile-Strategie im Unternehmen werden alle relevanten Aspekte wie rechtliche Rahmenbedingungen, Sicherheitsrisiken und deren Behandlung, technische Voraussetzungen (Software, IT-Infrastruktur, Support), Einführungs- und Betriebskosten, Erreichbarkeit und Collaboration sowie soziale Aspekte, Unternehmenspolitik und die Implementierung von BYOD beleuchtet. Damit wird dem zunehmenden Trend zur Nutzung von privaten, mobilen Endgeräten im beruflichen Umfeld Rechnung getragen. Praxisnah befassen sich die Autoren mit Problemen und Fragestellungen rund um die Integration von privaten Endgeräten in die IT-Infrastruktur des Arbeitgebers und liefern konkrete Herangehensweisen, Empfehlungen und Best-Practices für die Planung, Prüfung und Umsetzung einer BYOD -Strategie. Das Buch hilft allen, die eine Einführung von BYOD in ihrem Betrieb prüfen, zu einem umfassenden Verständnis von Chancen und möglichen Risiken, aber auch von Alternativen zu gelangen.
Bringing History to Life: Teaching Fact and Fiction (Education)
by Marc-André Éthier David LefrançoisHistory has never been as present in our daily lives as it is today. Through any number of media outlets, tens of millions of people are in daily contact with historical discourses and practices. Between games, informational articles, social media posts and other sources, history is everywhere—in Civilization VI, live-action role-playing games, The Berlin Trilogy, Game of Thrones, and the works of Tolkien or Satrapi. This rise in popularity of history, along with an unprecedented access to social platforms, provide opposing and irreconcilable views of what should be commemorated (or debunked), of decolonization and reconciliation, and of other historical and social justice questions such as the elimination of police brutality and racism. How can we help our youth develop the critical thinking they need to address these questions?Reflecting on the use of works of non-academic history in the classroom, the authors of this book explore the use of popular or public history to teach historical thinking that will enable students to become informed and engaged citizens.
Bringing Innovative Robotic Technologies from Research Labs to Industrial End-users: The Experience of the European Robotics Challenges (Springer Tracts in Advanced Robotics #136)
by Fabrizio Caccavale Zachary Taylor Christian Ott Bernd WinklerThis book presents the main achievements of the EuRoC (European Robotics Challenges) project, which ran from 1st January,2014 to 30th June 2018 and was funded by the European Union under the 7th Framework Programme. It describes not only the scientific and technological achievements of the project, but also the potential of the comparative challenge approach in robotics for knowledge advancement and technology transfer.
Bringing Machine Learning to Software-Defined Networks (SpringerBriefs in Computer Science)
by Zehua GuoEmerging machine learning techniques bring new opportunities to flexible network control and management. This book focuses on using state-of-the-art machine learning-based approaches to improve the performance of Software-Defined Networking (SDN). It will apply several innovative machine learning methods (e.g., Deep Reinforcement Learning, Multi-Agent Reinforcement Learning, and Graph Neural Network) to traffic engineering and controller load balancing in software-defined wide area networks, as well as flow scheduling, coflow scheduling, and flow migration for network function virtualization in software-defined data center networks. It helps readers reflect on several practical problems of deploying SDN and learn how to solve the problems by taking advantage of existing machine learning techniques. The book elaborates on the formulation of each problem, explains design details for each scheme, and provides solutions by running mathematical optimization processes, conducting simulated experiments, and analyzing the experimental results.
Bringing Out the Algebraic Character of Arithmetic: From Children's Ideas To Classroom Practice (Studies In Mathematical Thinking And Learning Ser.)
by David W. Carraher Analúcia D. Schliemann Bárbara M. BrizuelaBringing Out the Algebraic Character of Arithmetic contributes to a growing body of research relevant to efforts to make algebra an integral part of early mathematics instruction, an area of studies that has come to be known as Early Algebra. It provides both a rationale for promoting algebraic reasoning in the elementary school curriculum and empirical data to support it.The authors regard Early Algebra not as accelerated instruction but as an approach to existing topics in the early mathematics curriculum that highlights their algebraic character. Each chapter shows young learners engaged in mathematics tasks where there has been a shift away from computations on specific amounts toward thinking about relations and functional dependencies. The authors show how young learners attempt to work with mathematical generalizations before they have learned formal algebraic notation.The book, suitable as a text in undergraduate or graduate mathematics education courses, includes downloadable resources with additional text and video footage on how students reason about addition and subtraction as functions; on how students understand multiplication when it is presented as a function; and on how children use notations in algebraic problems involving fractions. These three videopapers (written text with embedded video footage) present relevant discussions that help identify students' mathematical reasoning. The printed text in the book includes transcriptions of the video episodes in the CD-ROM.Bringing Out the Algebraic Character of Arithmetic is aimed at researchers, practitioners, curriculum developers, policy makers and graduate students across the mathematics education community who wish to understand how young learners deal with algebra before they have learned about algebraic notation.
Britain and Germany Imagining the Future of Europe
by Leonard NovyThrough analysis of newspaper coverage on the debate over the future of Europe in Great Britain and Germany between 2000 and 2005, this book explores the intricate ways in which national identities shape media discourses on European integration. In doing so, it provides some compelling insights into Europe's emerging communicative space(s).
British Versions of Book II of Euclid’s Elements: Geometry, Arithmetic, Algebra (SpringerBriefs in History of Science and Technology)
by Leo CorryThis book discusses the changing conceptions about the relationship between geometry and arithmetic within the Euclidean tradition that developed in the British context of the sixteenth and seventeenth century. Its focus is on Book II of the Elements and the ways in which algebraic symbolism and methods, especially as recently introduced by François Viète and his followers, took center stage as mediators between the two realms, and thus offered new avenues to work out that relationship in idiosyncratic ways not found in earlier editions of the Euclidean text. Texts examined include Robert Recorde's Pathway to Knowledge (1551), Henry Billingsley’s first English translation of the Elements (1570), Clavis Mathematicae by William Oughtred and Artis Analyticae Praxis by Thomas Harriot (both published in 1631), Isaac Barrow’s versions of the Elements (1660), and John Wallis Treatise of Algebra (1685), and the English translations of Claude Dechales’ French Euclidean Elements (1685). This book offers a completely new perspective of the topic and analyzes mostly unexplored material. It will be of interest to historians of mathematics, mathematicians with an interest in history and historians of renaissance science in general.
Broad Bandwidth and High Dimensional Quantum Memory Based on Atomic Ensembles (Springer Theses)
by Dong-Sheng DingThis thesis presents an experimental study of quantum memory based on cold atomic ensembles and discusses photonic entanglement. It mainly focuses on experimental research on storing orbital angular momentum, and introduces readers to methods for storing a single photon carried by an image or an entanglement of spatial modes. The thesis also discusses the storage of photonic entanglement using the Raman scheme as a step toward implementing high-bandwidth quantum memory. The storage of photonic entanglement is central to achieving long-distance quantum communication based on quantum repeaters and scalable linear optical quantum computation. Addressing this key issue, the findings presented in the thesis are very promising with regard to future high-speed and high-capacity quantum communications.
Broad Learning Through Fusions: An Application on Social Networks
by Philip S. Yu Jiawei ZhangThis book offers a clear and comprehensive introduction to broad learning, one of the novel learning problems studied in data mining and machine learning. Broad learning aims at fusing multiple large-scale information sources of diverse varieties together, and carrying out synergistic data mining tasks across these fused sources in one unified analytic. This book takes online social networks as an application example to introduce the latest alignment and knowledge discovery algorithms. Besides the overview of broad learning, machine learning and social network basics, specific topics covered in this book include network alignment, link prediction, community detection, information diffusion, viral marketing, and network embedding.
Broadband Bringing Home The Bits
by Committee on Broadband Last Mile TechnologyBroadband communication expands our opportunities for entertainment, e-commerce and work at home, health care, education, and even e-government. It can make the Internet more useful to more people. But it all hinges on higher capacity in the “first mile” or “last mile” that connects the user to the larger communications network. That connection is often adequate for large organizations such as universities or corporations, but enhanced connections to homes are needed to reap the full social and economic promise. Broadband: Bringing Home the Bits provides a contemporary snapshot of technologies, strategies, and policies for improving our communications and information infrastructure. It explores the potential benefits of broadband, existing and projected demand, progress and failures in deployment, competition in the broadband industry, and costs and who pays them. Explanations of broadband’s alphabet soup – HFC, DSL, FTTH, and all the rest – are included as well. The report’s finding and recommendations address regulation, the roles of communities, needed research, and other aspects, including implications for the Telecommunications Act of 1996.
Broadband Communications, Computing, and Control for Ubiquitous Intelligence (Wireless Networks)
by Brian L. Mark Lin Cai Jianping PanThis book reports on the latest advances from both industry and academia on ubiquitous intelligence and how it is enabled by 5G/6G communication technologies. The authors cover network protocol and architecture design, machine learning and artificial intelligence, coordinated control and digital twins technologies, and security and privacy enhancement for ubiquitous intelligence. The authors include recent studies of performance analysis and enhancement of the Internet of Things, cyber-physical systems, edge computing, and cyber twins, all of which provide importance guidance and theoretical tools for developing future ubiquitous intelligence. The content of the book will be of interest to students, educators, and researchers in academia, industry, and research laboratories.Provides comprehensive coverage of enabling communications, computing, and control technologies for ubiquitous intelligence;Presents a novel paradigm of ubiquitous intelligence powered by broadband communications, computing, and control;Includes a review of 5G/6G communication technologies, network protocol and architecture design, and ubiquitous computing.
Broadband Communications, Networks, and Systems: 10th EAI International Conference, Broadnets 2019, Xi’an, China, October 27-28, 2019, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #303)
by Rui Li Wei Xi Honghao Gao Qingshan Li Shengli Song Yueshen XuThis book constitutes the refereed post-conference proceedings of the 10th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2019, which took place in Xi’an, China, in October 2019. The 19 full papers presented were carefully reviewed and selected from 61 submissions. The papers are thematically grouped as follows: Wireless Networks and Applications, Communication and Sensor Networks, Internet of Things, Pervasive Computing, Security and Privacy.
Broadband Communications, Networks, and Systems: 11th EAI International Conference, BROADNETS 2020, Qingdao, China, December 11–12, 2020, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #355)
by Rui Li Honghao Gao Ramón J. Durán Barroso Pang ShanchenThis book constitutes the refereed post-conference proceedings of the 11th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2020, which took place in Qingdao, China, in December 2020. The 13 full papers presented were carefully reviewed and selected from 32 submissions. The papers are thematically grouped as a session on wireless network and security and a session on communication quality.
Broadband Communications, Networks, and Systems: 12th EAI International Conference, BROADNETS 2021, Virtual Event, October 28–29, 2021, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #413)
by Wei Xiang Fengling Han Tran Khoa PhanThis book constitutes the refereed post-conference proceedings of the 12th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2021, which took place in October 2021. Due to COVID-19 pandemic the conference was held virtually. The 24 full papers presented were carefully reviewed and selected from 49 submissions. The papers are thematically grouped as a session on broadband communications, networks, and systems; 5G-enabled smart building: technology and challenge; and 5G: The advances in industry.
Broadband Communications, Networks, and Systems: 13th EAI International Conference, BROADNETS 2022, Virtual Event, March 12-13, 2023 Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #511)
by Wei Wang Jun WuThis book constitutes the refereed post-conference proceedings of the 13th EAI International Conference on Broadband Communications, Networks, and Systems, Broadnets 2022, which took place in March 2023. Due to COVID-19 pandemic the conference was held virtually. The 9 full papers presented were carefully reviewed and selected from 23 submissions. The papers are thematically grouped as follows: Mobile Communication Networks; Mobile Software Security; and Algorithm, Model and Application. The scope of this conference is the 5G-enabled digital society.
Broadband Communications, Networks, and Systems: 14th EAI International Conference, BROADNETS 2024, Hyderabad, India, February 16–17, 2024, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #601)
by Xiaochun ChengThis two-volume set, LNICST 601 and LNICST 602, constitutes the refereed post-conference proceedings of the 14th International Conference on Broadband Communications, Networks, and Systems, BROADNETS 2024, held in Hyderabad, India, in February 16–17, 2024. The 49 full papers presented here were carefully reviewed and selected from 122 submissions. These papers have been organized under the following topical sections in the two volumes: - Part I: Communications, Networks and Architectures; Smart City Smart Grid; Communication-inspired Machine Learning (ML) for 5G/6G. Part II: Wireless Network Security and Privacy; AI applications for 5G/6G.
Broadband Communications, Networks, and Systems: 14th EAI International Conference, BROADNETS 2024, Hyderabad, India, February 16–17, 2024, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #602)
by Xiaochun ChengThis two-volume set, LNICST 601 and LNICST 602, constitutes the refereed post-conference proceedings of the 14th International Conference on Broadband Communications, Networks, and Systems, BROADNETS 2024, held in Hyderabad, India, in February 16–17, 2024. The 49 full papers presented here were carefully reviewed and selected from 122 submissions. These papers have been organized under the following topical sections in the two volumes: - Part I: Communications, Networks and Architectures; Smart City Smart Grid; Communication-inspired Machine Learning (ML) for 5G/6G. Part II: Wireless Network Security and Privacy; AI applications for 5G/6G.
Broadband Communications, Networks, and Systems: 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #263)
by Victor Sucasas Georgios Mantas Saud AlthunibatThis book constitutes the refereed post-conference proceedings of the 9th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2018, which took place in Faro, Portugal, in September 2018. The 30 revised full and 16 workshop papers were carefully reviewed and selected from 68 submissions. The papers are thematically grouped as follows: Advanced Techniques for IoT and WSNs; SDN and Network Virtualization; eHealth and Telemedicine Mobile Applications; Security and Privacy Preservation; Communication Reliability and Protocols; Spatial Modulation Techniques; Hardware Implementation and Antenna Design.
Broadband Connectivity in 5G and Beyond: Next Generation Networks
by Gurpreet Kaur Simranjit Singh Mohammad Tariqul Islam R. S. KalerThis book discusses the role of optical networks in 3G, 4G, 5G and beyond. The authors discuss the evolution of the technologies, the research involved, and the applications with respect to optical communication systems. In addition, the book provides in-depth knowledge of broadband connectivity for future generation networks. More focus is given towards the front-, mid- and back- hauling of 5G and beyond. The authors present architecture for broadband connectivity and explain its potential in 5G and beyond applications. This book includes several architectures based on Hybrid Fiber-Wireless; Next Generation Passive Optical Networks Stage 1 and 2; millimeter wave over fiber; sub-THz wave over fiber; millimeter/sub-THz wave over multicore fiber; 6G fronthaul; 6G backhaul; GMPLS networks, and massive MIMO sub-Thz antenna. The contributors provide supplementary material such as simulations, analysis and experiments.
Broadband Direct RF Digitization Receivers (Analog Circuits and Signal Processing #121)
by Olivier JaminThis book discusses the trade-offs involved in designing direct RF digitization receivers for the radio frequency and digital signal processing domains. A system-level framework is developed, quantifying the relevant impairments of the signal processing chain, through a comprehensive system-level analysis. Special focus is given to noise analysis (thermal noise, quantization noise, saturation noise, signal-dependent noise), broadband non-linear distortion analysis, including the impact of the sampling strategy (low-pass, band-pass), analysis of time-interleaved ADC channel mismatches, sampling clock purity and digital channel selection. The system-level framework described is applied to the design of a cable multi-channel RF direct digitization receiver. An optimum RF signal conditioning, and some algorithms (automatic gain control loop, RF front-end amplitude equalization control loop) are used to relax the requirements of a 2.7GHz 11-bit ADC. A two-chip implementation is presented, using BiCMOS and 65nm CMOS processes, together with the block and system-level measurement results. Readers will benefit from the techniques presented, which are highly competitive, both in terms of cost and RF performance, while drastically reducing power consumption.
Broadband Mobile Multimedia: Techniques and Applications (Wireless Networks and Mobile Communications)
by Thomas M. Chen Shiwen Mao Laurence T. Yang Yan ZhangMultimedia service provisioning is believed to be one of the prerequisites to guarantee the success of next-generation wireless networks. Examining the role of multimedia in state-of-the-art wireless systems and networks, Broadband Mobile Multimedia: Techniques and Applications presents a collection of introductory concepts, fundamental tech