Résultats de recherche de titre
Articles 1 à 20 sur 3694
Kid Olympians: True Tales of Childhood from Champions and Game Changers (Kid Legends #9)
Par Robin Stevenson. 2024
Triumphant, relatable, and totally true biographies tell the childhood stories of a diverse group of international athletes who have captured…
the world’s attention at the Summer Olympics and Paralympics, like Simone Biles, Jesse Owens, Naomi Osaka, Tatyana McFadden, and 12 other incredible olympians.Athletes throughout history have dreamed of competing in the Olympics—and some were kids themselves when those dreams and plans began! In Kid Olympians: Summer, discover the childhood stories of legends such as: Usain Bolt, who used to skip practices to go to the arcade and play video games.Serena Williams, who sometimes hit her tennis ball over the fence on purpose!Tatyana McFadden, who had to fight to be allowed on her school’s track teamFeaturing kid-friendly text and full-color illustrations, you’ll be inspired to dream bigger, faster, and higher than ever before! The diverse and inspiring group also includes Michael Phelps, Yusra Mardini, Dick Fosbury, Ibtihaj Muhammad, Gertrude Ederle, Nadia Comaneci, Ellie Simmonds, Tommie Smith, Wilma Rudolph, and Megan Rapinoe.Pride and Persistence: Stories of Queer Activism (Do You Know My Name? #4)
Par Mary Fairhurst Breen. 2023
The activists between these pages have stood up for the queer community, whether on their own behalf or in support…
of people they love. Some made a difference by confronting injustice; others dared to be fully themselves.See It, Dream It, Do It: How 25 people just like you found their dream jobs
Par Colleen Nelson, Kathie MacIsaac. 2023
From award-winning author Colleen Nelson, and literacy advocate Kathie MacIsaac, twenty-five profiles present a plethora of jobs, and people, making…
it easier than ever for young people to see their dreams and to live their dreams!Beryl: The Making of a Disability Activist
Par Dustin Galer. 2023
The story of a mid-century working-class housewife whose extraordinary physical transformation empowered her to become a dynamic social activist who…
fueled a movement to create a more inclusive future for people with disabilities.The Engineering Executive's Primer
Par Will Larson. 2024
As an engineering manager, you almost always have someone in your company to turn to for advice: a peer on…
another team, your manager, or even the head of engineering. But who do you turn to if you're the head of engineering? Engineering executives have a challenging learning curve, and many folks excitedly start their first executive role only to leave frustrated within the first 18 months.In this book, author Will Larson shows you ways to obtain your first executive job and quickly ramp up to meet the challenges you may not have encountered in non-executive roles: measuring engineering for both engineers and the CEO, company-scoped headcount planning, communicating successfully across a growing organization, and figuring out what people actually mean when they keep asking for a "technology strategy."This book explains how to:Get an engineering executive job, negotiate the contract, and onboard at your new companyRun an engineering planning process and communicate effectively with the organizationDirect the core meetings necessary to operate an effective engineering organizationHire, onboard, and run performance managementManage yourself and remain effective through many challengesLeave the job when the time is rightWill Larson was the chief technology officer at Calm and the author of An Elegant Puzzle and Staff Engineer. He's also a prolific writer on his blog, Irrational Exuberance.Advances in Aerial Sensing and Imaging
Par Sandeep Kumar, Nageswara Rao Moparthi, Abhishek Bhola, Ravinder Kaur, A. Senthil, K.M.V.V. Prasad. 2024
Advances in Aerial Sensing and Imaging This groundbreaking book is a comprehensive guide to the technology found in the complex…
field of aerial sensing and imaging, and the real-world challenges that stem from its growing significance and demand. The advent of unmanned aerial vehicles (UAVs), or drones, along with advancements in sensor technology and image processing techniques, has further enhanced the capabilities and applications of aerial sensing and imaging. These developments have opened up new research, innovation, and exploration avenues. Aerial sensing and imaging have rapidly evolved over the past few decades and have revolutionized several fields, including land cover and usage prediction, crop and livestock management, road accident monitoring, poverty estimation, defense, agriculture, forest fire detection, UAV security issues, and open parking management. This book provides a comprehensive understanding and knowledge of the underlying technology and its practical applications in different domains. Audience Computer science and artificial intelligence researchers working in the fields of aerial sensing and imaging, as well as professionals working in industries such as agriculture, geology, surveying, urban planning, disaster response, etc; this book provides them with practical guidance and instruction on how to apply aerial sensing and imaging for various purposes and stay up-to-date with the latest developments in the domain.Optimized Predictive Models in Health Care Using Machine Learning
Par Sandeep Kumar, Anuj Sharma, Navneet Kaur, Lokesh Pawar, Rohit Bajaj. 2024
OPTIMIZED PREDICTIVE MODELS IN HEALTH CARE USING MACHINE LEARNING This book is a comprehensive guide to developing and implementing optimized…
predictive models in healthcare using machine learning and is a required resource for researchers, healthcare professionals, and students who wish to know more about real-time applications. The book focuses on how humans and computers interact to ever-increasing levels of complexity and simplicity and provides content on the theory of optimized predictive model design, evaluation, and user diversity. Predictive modeling, a field of machine learning, has emerged as a powerful tool in healthcare for identifying high-risk patients, predicting disease progression, and optimizing treatment plans. By leveraging data from various sources, predictive models can help healthcare providers make informed decisions, resulting in better patient outcomes and reduced costs. Other essential features of the book include: provides detailed guidance on data collection and preprocessing, emphasizing the importance of collecting accurate and reliable data; explains how to transform raw data into meaningful features that can be used to improve the accuracy of predictive models; gives a detailed overview of machine learning algorithms for predictive modeling in healthcare, discussing the pros and cons of different algorithms and how to choose the best one for a specific application; emphasizes validating and evaluating predictive models; provides a comprehensive overview of validation and evaluation techniques and how to evaluate the performance of predictive models using a range of metrics; discusses the challenges and limitations of predictive modeling in healthcare; highlights the ethical and legal considerations that must be considered when developing predictive models and the potential biases that can arise in those models. Audience The book will be read by a wide range of professionals who are involved in healthcare, data science, and machine learning.Rosa Parks: Civil Rights Leader (Black Americans of Achievement Legacy Edition)
Par Mary Hull, Gloria Blakely, Dale Evva Gelfand. 2008
On December 1, 1955, seamstress Rosa Parks took a stand by refusing to give up her seat on a bus…
to a white man. Her defiance against an unjust system triggered the Montgomery Bus Boycott and helped spark the civil rights movement in the 1960s. Parks demonstrated the effectiveness of unified peaceful protests, and throughout her life she advocated an end to violence, discrimination, and injustice, eventually establishing the Rosa and Raymond Parks Institute for Self-Development. Rosa Parks, Updated Edition, includes fresh insights on the life and legacy of the woman known as the "mother of the civil rights movement."Dinner on Monster Island: Essays
Par Tania De Rozario. 2024
In this unusual, engaging, and intimate collection of personal essays, Lambda Literary Award finalist Tania De Rozario recalls growing up…
as a queer, brown, fat girl in Singapore, blending memoir with elements of history, pop culture, horror films, and current events to explore the nature of monsters and what it means to be different.Tania De Rozario was just twelve years old when she was gay-exorcised. Convinced that her boyish style and demeanor were a sign of something wicked, her mother and a pair of her church friends tried to “banish the evil” from Tania. That day, the young girl realized that monsters weren’t just found in horror tales. They could lurk anywhere—including your own family and community—and look just like you. Dinner on Monster Island is Tania’s memoir of her life and childhood in Singapore—where she discovered how difference is often perceived as deviant, damaged, disobedient, and sometimes, demonic. As she pulls back the veil on life on the small island, she reveals the sometimes kind, sometimes monstrous side of all of us. Intertwined with her experiences is an analysis of the role of women in horror. Tania looks at films and popular culture such as Carrie, The Witch, and The Ring to illuminate the ways in which women are often portrayed as monsters, and how in real life, monsters are not what we think. Moving and lyrical, written with earnest candor, and leavened with moments of humor and optimism, Dinner on Monster Island is a deeply personal examination of one woman’s experience grappling with her identity and a fantastic analysis of monsters, monstrous women and the worlds in which they live.Blockchain-based Internet of Things: Opportunities, Challenges and Solutions
Par Iraq Ahmad Reshi, Sahil Sholla. 2024
This book presents an overview of the blockchain-based Internet of Things systems, along with the opportunities, challenges, and solutions in…
diverse fields such as business, education, agriculture, and healthcare. It discusses scalability, security, layers, threats, and countermeasures in blockchain-based Internet of Things network.· Elaborates on the opportunities presented by combining blockchain with artificial intelligence on the Internet of Things systems in the management of food systems, and drug supply chains.· Explains the management of computationally intensive tasks in blockchain-based Internet of Things through the development of lightweight protocols.· Presents various applications in fields including logistics and the supply chain, automobile industry, smart housing, shared economy, and agriculture.· Provides insights into blockchain-based Internet of Things systems, along with their features, vulnerabilities, and architectural flaws.· The text is primarily written for graduate students, and academic researchers working in the fields of computer science and engineering, electrical engineering, and information technology.This book unveils the most advanced techniques and innovative applications in the natural language processing (NLP) field. It uncovers the…
secrets to enhancing language understanding, and presents practical solutions to different NLP tasks, as text augmentation, paraphrase generation, and restoring spaces and punctuation in multiple languages. It unlocks the potential of hierarchical multi-task learning for cross-lingual phoneme recognition, and allows readers to explore more real-world applications such as error correction, aggregating industrial security findings as well as predicting music emotion values from social media conversations. "Practical Solutions for Diverse Real-World NLP Applications" is the suitable guidebook for researchers, students, and practitioners as it paves the way for them by delivering invaluable insights and knowledge.Computer Science and Educational Informatization: 5th International Conference, CSEI 2023, Kunming, China, August 11–13, 2023, Revised Selected Papers, Part II (Communications in Computer and Information Science #1900)
Par Jianhou Gan, Yi Pan, Juxiang Zhou, Dong Liu, Xianhua Song, Zeguang Lu. 2024
These two volumes constitute the revised selected papers of the 5th International Conference, CSEI 2023, held in Kunming, China, during…
August 11–13, 2023.The 76 full papers and the 21 short papers included in this volume were carefully reviewed and selected from 297 submissions. They focus on computer science, education informatization and engineering education, innovative application for the deeper integration of education practice and information technology, educational informatization and big data for education.Optimising NMR Spectroscopy Through Method and Software Development (Springer Theses)
Par Jonathan Yong. 2024
This book provides a comprehensive overview of Nuclear Magnetic Resonance (NMR) theory, its applications, and advanced techniques to improve the…
quality and speed of NMR data acquisition. In this book, the author expands his outstanding Ph.D. thesis and provides a valuable resource for researchers, professionals, and students in the field of NMR spectroscopy. The book covers quantum mechanics basics, and topics like density operators, pulse sequences, 1D pulse acquisition, INEPT (Insensitive nuclei enhancement by polarization transfer), product operators, and 2D NMR principles. It also explores innovative experiments like States HSQC (Heteronuclear Single Quantum Coherence) and echo-antiecho HSQC with gradients. In the subsequent chapters, the author discusses Pure Shift NMR, including PSYCHE (Pure Shift Yielded by Chirp Excitation) and its optimizations, such as waveform parameterization and time-reversal methods. The 'Discrete PSYCHE' approach and Ultrafast PSYCHE-iDOSY (Diffusion-ordered spectroscopy) are also highlighted. This book presents the POISE (Parameter Optimisation by Iterative Spectral Evaluation) software for real-time NMR experiment optimization, including pulse width calibration and Ernst angle optimization, and demonstrates applications across various NMR experiments. Lastly, the book examines accelerated 2D NMR data collection and the NOAH (NMR by Ordered Acquisition using 1H detection) supersequences, emphasizing automated pulse program creation using GENESIS (GENEration of Supersequences In Silico). Covered NMR experiments include 13C sensitivity-enhanced HSQC, 15N HMQC (Heteronuclear Multiple Quantum Coherence), dual HSQC, HSQC-TOCSY (Total Correlation Spectroscopy), HMBC (Heteronuclear Multiple Bond Correlation), and ADEQUATE (Adequate Sensitivity Double-Quantum Spectroscopy).Information and Software Technologies: 29th International Conference, ICIST 2023, Kaunas, Lithuania, October 12–14, 2023, Proceedings (Communications in Computer and Information Science #1979)
Par Audrius Lopata, Daina Gudonienė, Rita Butkienė. 2024
This book constitutes the refereed proceedings of the 29th International Conference on Information and Software Technologies, ICIST 2023, held in…
Kaunas, Lithuania, in October 2023.The 27 full papers included in this volume were carefully reviewed and selected from 75 submissions. These proceedings contain a diverse array of research and insights in the field of Information Technology and related areas, such as: intelligent systems and software engineering advances, intelligent methods for data analysis and computer aided software engineering, language technologies and smart e-learning applications, AI-based it solutions.Continuous Biometric Authentication Systems: An Overview (SpringerBriefs in Computer Science)
Par Max Smith-Creasey. 2024
This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from…
user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges.This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable to devices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches.This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security.Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks (Advances in Computer Vision and Pattern Recognition)
Par Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez, Christoph Busch. 2022
This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes,…
Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the topic, which address readers wishing to gain a brief overview of the state-of-the-art. Subsequent chapters, which delve deeper into various research challenges, are oriented towards advanced readers. Moreover, the book provides a good starting point for young researchers as well as a reference guide pointing at further literature. Hence, the primary readership is academic institutions and industry currently involved in digital face manipulation and detection. The book could easily be used as a recommended text for courses in image processing, machine learning, media forensics, biometrics, and the general security area.Technologieinduzierte Entwicklung neuer Wertversprechen im Software-intensive Business
Par Felix Schönhofen. 2023
Die Digitalisierung der meisten Branchen spiegelt sich in einem wachsenden Anteil der Software an der Gesamtwertschöpfung wider. Unternehmen eröffnen sich…
dadurch neue Möglichkeiten für technologische Innovationen. Gleichzeitig stehen sie aber vor der ständigen Herausforderung, diese Innovationen in Produkte zu überführen, die für den Kunden wertstiftend sind. Dieser Problemstellung widmeten sich bereits eine Reihe an Methoden zur Produkt- und Geschäftsmodellinnovation, die Überführung der hier gewonnenen Erkenntnisse in die konkrete Produktgestaltung bleibt jedoch eine Herausforderung.Genau hier setzt diese Arbeit an, indem sie die methodische Vorgehensweise „Value Proposition Deployment“ vorschlägt, mit der Unternehmen auf Basis technologischer Innovationen neue Wertversprechen entwickeln können. Hierzu verbindet das Value Proposition Deployment Erkenntnisse des Innovationsmanagements mit Methoden der konstruktiven Qualitätssicherung und stellt somit eine Brücke zwischen Innovations- und Qualitätsmanagement dar. Die auf Basis von 15 praxisrelevanten Gestaltungsanforderungen entwickelte Methode wird detailliert erläutert und anhand praxisnaher Fallbeispiele beschrieben.Formal Methods for Industrial Critical Systems: 25th International Conference, FMICS 2020, Vienna, Austria, September 2–3, 2020, Proceedings (Lecture Notes in Computer Science #12327)
Par Maurice H. ter Beek, Dejan Ničković. 2020
This book constitutes the proceedings of the 25th International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2020, which…
was held during September 2-3, 2020. The conference was planned to take place in Vienna, Austria. Due to the COVID-19 pandemic it changed to a virtual event.The 11 full papers presented in this volume were carefully reviewed and selected from 26 submissions. The papers are organized in topical sections as follows: Quantitative Analysis and Cyber-Physical Systems, Formal Verification of Industrial Systems, Temporal Logic and Model Checking. The book also contains a lengthy report on a Formal Methods Survey conducted on occasion of the 25th edition of the conference.Computer Security. ESORICS 2022 International Workshops: CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers (Lecture Notes in Comput
Par Sokratis Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla. 2023
This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium…
on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022. The 39 papers included in these proceedings stem from the following workshops: 8th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2022, which accepted 8 papers from 15 submissions; 6th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2022, which accepted 2 papers from 5 submissions; Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2022, which accepted 4 full papers out of 13 submissions; Third Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2022, which accepted 9 full and 1 short paper out of 19 submissions; Second International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2022, which accepted 5 papers out of 8 submissions; First International Workshop on Election Infrastructure Security, EIS 2022, which accepted 5 papers out of 10 submissions; and First International Workshop on System Security Assurance, SecAssure 2022, which accepted 5 papers out of 10 submissions.Segmentation of the Aorta. Towards the Automatic Segmentation, Modeling, and Meshing of the Aortic Vessel Tree from Multicenter Acquisition: First Challenge, SEG.A. 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 8, 2023, Procee
Par Antonio Pepe, Gian Marco Melito, Jan Egger. 2024
This book constitutes the First Segmentation of the Aorta Challenge, SEG.A. 2023, which was held in conjunction with the 26th…
International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2023, on October 8, 2023. The 8 full and 3 short papers presented have been carefully reviewed and selected for inclusion in the book. They focus specifically on robustness, visual quality and meshing of automatically generated segmentations of aortic vessel trees from CT imaging. The challenge was organized as a ”container submission” challenge, where participants had to upload their algorithms to Grand Challenge in the form of Docker containers. Three tasks were created for SEG.A. 2023.