Résultats de recherche de titre
Articles 1 à 20 sur 6667
Drawing upon oral and documentary evidence, this volume explores the lives of noteworthy Mi’kmaw individuals whose thoughts, actions, and aspirations…
impacted the history of the Northeast but whose activities were too often relegated to the shadows of history. The book highlights Mi’kmaw leaders who played major roles in guiding the history of the region between 1680 and 1980. It sheds light on their community and emigration policies, organizational and negotiating skills, diplomatic endeavours, and stewardship of land and resources. Contributors to the volume range from seasoned scholars with years of research in the field to Mi’kmaw students whose interest in their history will prove inspirational. Offering important new insights, the book re-centres Indigenous nationhood to alter the way we understand the field itself. The book also provides a lengthy index so that information may be retrieved and used in future research. Muiwlanej kikamaqki – Honouring Our Ancestors will engage the interest of Indigenous and non-Indigenous readers alike, engender pride in Mi’kmaw leadership legacies, and encourage Mi’kmaw youth and others to probe more deeply into the history of the Northeast.Frontiers of Supercomputing II: A National Reassessment (Los Alamos Series in Basic and Applied Sciences #13)
Par Karyn R. Ames, Alan Brenner. 2023
This uniquely comprehensive book brings together the vast amount of technical, economic, and political information and the analyses of supercomputing…
that have hitherto been buried in the frequently inaccessible "gray literature." Seventy-nine distinguished participants in the second Frontiers of Supercomputing conference offer perceptive and often controversial views on the emerging computing environment in the United States. This title is part of UC Press's Voices Revived program, which commemorates University of California Press’s mission to seek out and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1994.Big Witch Energy: Power Spells for Modern Witches
Par Semra Haksever. 2023
If you've ever felt oppressed, angry at the patriarchy, been ghosted or experienced a bad case of imposter syndrome, this…
book is just the magical elixir you've been waiting for.Join expert witch Semra Haksever as she invites you to summon your Big Witch Energy and awaken the abundance of power within.Filled with spells and rituals that are perfect for novice witches and seasoned spellcasters alike, Semra encourages you to practise radical self-acceptance, be comfortable and confident in your skin and to question society's expectations. There's a spell to help stop people-pleasing, a 'protective shield' body lotion and a foot scrub that will encourage you to walk your own path. As well as this, there are practical spells to call in money and good luck, banish negativity and much more.This collection of spells will enable you connect with the best version of yourself and truly feel your power. So, step into the magic and embrace your Big Witch Energy.Hybrid Threats, Cyberterrorism and Cyberwarfare
Par Helge Janicke, Ioanna Kantzavelou, Leandros Maglaras, Mohamed Amine Ferrag. 2024
Nowadays, in Cyberspace there is a burst of information that everyone has access. However, apart from the advantages the Internet…
offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term, encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict etc and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike. ‘Cyber-conflict’ and ‘cyber-war’ serve as examples of the use of new technologies within the scope of hybrid threats. Cyber-war basically refers to a sustained computer-based cyber-attack by a state against the IT infrastructure of a target state. On the other hand cyber-security is a major factor that shapes productivity and efficiency of the modern industry in both technical and economic terms. The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threats, sector specific cyber-attacks that have the form of cyberterrorism and presents the recent actions that EU, USA and other Nations have taken in order to strengthen their systems against such attacks. There has never been a higher risk of a major catastrophe as a result of the rise in offensive cyber activity, particularly the possibility of cyber-physical strikes against critical services. Recent cyber-attacks against critical infrastructures along with the continuous migration crisis have been the main driving forces that led to the decision to publish this book.The Science of Esports
Par Matthew Watson, Craig McNulty, Remco Polman, Kabir Bubna. 2024
The Science of Esports draws from contemporary research and coach expertise to examine esports athlete health and performance from a…
range of disciplinary perspectives, including physiology, psychology, sociology, and nutrition. The rapid expansion of the esports industry has elevated competitive video gaming into the realm of high performance, requiring players, coaches, and practitioners to implement interdisciplinary approaches to performance support. The book covers key topic areas such as: What esports is and similarities and differences to sport Game-specific training Physiological and psychological consideration for esports athletes Social aspects of player performance and the social environment of esports Esports coaching and structure of esports performance environments Technology and its use in esports Safeguarding, cheating, and gambling This book includes worked examples and case studies to allow immediate implementation into practice for esports athletes and coaches. It summarises the current state of research to inform researchers and identify gaps in knowledge. This book is critical reading for students of esports and related courses. It serves as the first scientific resource designed to provide athletes, coaches, and practitioners with interdisciplinary insights into esports health and performance.Information and Communications Technologies for Smart Cities and Societies (The City Project #5)
Par Roberto Menozzi. 2024
This book offers an overview of digital, IoT and intelligent technologies, applications and solutions that are contributing to shape the…
digital, inclusive, and sustainable transformation of contemporary cities. Based on peer-reviewed contributions to the workshop "Information and Communications Technologies for Smart Cities and Societies", held on December 2, 2022, at the University of Parma, Italy, it offers a multidisciplinary, authoritative snapshot for researchers, architects, and engineers, as well as professionals and policy makers, involved in planning the city of the future. The book describes practical case studies, discussing challenges and opportunities of the integration of ICTs in the planning and management of future cities.Solvable Cellular Automata: Methods and Applications (Understanding Complex Systems)
Par Henryk Fukś. 2023
The main focus of the book is solvability of cellular automata, that is, expressing the state of a given cell…
after a given number of steps by an explicit formula. The author considers solutions of two types of initial value problems for cellular automata, the deterministic one and the probabilistic one. In the first chapter the basic concepts of cellular automata theory are introduced. Deterministic initial value problem is introduced next and solutions for selected simple rules are also presented. In the following chapters various techniques for solving the deterministic problem are introduced, using elementary CA rules of increasing complexity as examples. The second part of the book introduces the concept of probability measure in the context of cellular automata and the probabilistic initial value problem for both deterministic and probabilistic rules. The book is amply illustrated with examples and applications such as the density classification problem, phase transitions in traffic models or the diffusion of innovations model. In the appendix, solution formulae (both deterministic and probabilistic) for over 60 elementary cellular automata rules are listed. Ruelle-Frobenius-Perron equations for all 88 minimal elementary cellular automata are also provided.Development of Safety-Critical Systems: Architecture and Software
Par Gopinath Karmakar, Amol Wakankar, Ashutosh Kabra, Paritosh Pandya. 2023
This book provides professionals and students with practical guidance for the development of safety-critical computer-based systems. It covers important aspects…
ranging from complying with standards and guidelines to the necessary software development process and tools, and also techniques pertaining to model-based application development platforms as well as qualified programmable controllers.After a general introduction to the book’s topic in chapter 1, chapter 2 discusses dependability aspects of safety systems and how architectural design at the system level helps deal with failures and yet achieves the targeted dependability attributes. Chapter 3 presents the software development process which includes verification and validation at every stage, essential to the development of software for systems performing safety functions. It also explains how the process helps in developing a safety case that can be independently verified and validated. The subsequent chapter 4 presents some important standards and guidelines, which apply to different industries and in different countries. Chapter 5 then discusses the steps towards complying with the standards at every phase of development. It offers a guided tour traversing the path of software qualification by exploring the necessary steps towards achieving the goal with the help of case studies. Chapter 6 highlights the application of formal methods for the development of safety systems software and introduces some available notations and tools which assist the process. Finally, chapter 7 presents a detailed discussion on the importance and the advantages of qualified platforms for safety systems application development, including programmable controller (PLC) and formal model-based development platforms. Each chapter includes case studies illustrating the subject matter.The book is aimed at both practitioners and students interested in the art and science of developing computer-based systems for safety-critical applications. Both audiences will get insights into the tools and techniques along with the latest developments in the design, analysis and qualification, which are constrained by the regulatory and compliance requirements mandated by the applicable guides and standards. It also addresses the needs of professionals and young graduates who specialize in the development of necessary tools and qualified platforms.Maia Toll&’s Wild Wisdom series—The Illustrated Herbiary, The Illustrated Bestiary, and The Illustrated Crystallary—introduced readers to the mystical energy of…
the animal, vegetable, and mineral kingdoms. In this capstone to the Wild Wisdom series, Maia Toll's Wild Wisdom Companion guides readers in developing a personalized earth-based spiritual practice using rituals, writing prompts, recipes, symbols, and reflections tied to each season. Organized into 12 chapters—Winter Solstice, Spring Equinox, Summer Solstice, Autumnal Equinox, plus early and late stages of each of the four seasons — the book features seasonal practices; exercises for the body and for writing and reflection; plant, animal, and mineral medicine; and symbolic explorations of the gifts and challenges that arise with seasonal change. Original illustrations by Kate O&’Hara illuminate the symbolic richness of the text, and 28 pop-out oracle cards plus four bound-in pocket pages enhance the invitation for readers to use this interactive guide as an ongoing tool for cultivating the sacred in their own lives.Learning Automata and Their Applications to Intelligent Systems
Par MengChu Zhou, JunQi Zhang. 2024
Comprehensive guide on learning automata, introducing two variants to accelerate convergence and computational update speed Learning Automata and Their Applications…
to Intelligent Systems provides a comprehensive guide on learning automata from the perspective of principles, algorithms, improvement directions, and applications. The text introduces two variants to accelerate the convergence speed and computational update speed, respectively; these two examples demonstrate how to design new learning automata for a specific field from the aspect of algorithm design to give full play to the advantage of learning automata. As noisy optimization problems exist widely in various intelligent systems, this book elaborates on how to employ learning automata to solve noisy optimization problems from the perspective of algorithm design and application. The existing and most representative applications of learning automata include classification, clustering, game, knapsack, network, optimization, ranking, and scheduling. They are well-discussed. Future research directions to promote an intelligent system are suggested. Written by two highly qualified academics with significant experience in the field, Learning Automata and Their Applications to Intelligent Systems covers such topics as: Mathematical analysis of the behavior of learning automata, along with suitable learning algorithms Two application-oriented learning automata: one to discover and track spatiotemporal event patterns, and the other to solve stochastic searching on a line Demonstrations of two pioneering variants of Optimal Computing Budge Allocation (OCBA) methods and how to combine learning automata with ordinal optimization How to achieve significantly faster convergence and higher accuracy than classical pursuit schemes via lower computational complexity of updating the state probabilityA timely text in a rapidly developing field, Learning Automata and Their Applications to Intelligent Systems is an essential resource for researchers in machine learning, engineering, operation, and management. The book is also highly suitable for graduate level courses on machine learning, soft computing, reinforcement learning and stochastic optimization.The Good Habit Workbook: A Practical Toolkit to Help You Change Your Life One Good Habit at a Time
Par Freya Stephens. 2023
Break away from bad habits and build healthy ones with this step-by-step workbook, which will help you make positive changes…
in your life. Including practical advice, effective tips and guided exercises, it will help you free yourself from negative cycles and replace them with positive, productive habits for long-term health and happiness.Proceedings of International Conference on Paradigms of Communication, Computing and Data Analytics: PCCDA 2023 (Algorithms for Intelligent Systems)
Par Anupam Yadav, Meng-Hiot Lim, Satyasai Jagannath Nanda. 2023
This book is a collection of selected high-quality research papers presented at International Conference on Paradigms of Communication, Computing and…
Data Analytics (PCCDA 2023), held at South Asian University, New Delhi, India, during 22–23 April 2023. It discusses cutting-edge research in the areas of advanced computing, communications and data science techniques. The book is a collection of latest research articles in computation algorithm, communication and data sciences, intertwined with each other for efficiency.Data Centric Artificial Intelligence: A Beginner’s Guide (Data-Intensive Research)
Par Parikshit N. Mahalle, Gitanjali R. Shinde, Yashwant S. Ingle, Namrata N. Wasatkar. 2023
This book discusses the best research roadmaps, strategies, and challenges in data-centric approach of artificial intelligence (AI) in various domains.…
It presents comparative studies of model-centric and data-centric AI. It also highlights different phases in data-centric approach and data-centric principles. The book presents prominent use cases of data-centric AI. It serves as a reference guide for researchers and practitioners in academia and industry.Health Information Science: 12th International Conference, HIS 2023, Melbourne, VIC, Australia, October 23–24, 2023, Proceedings (Lecture Notes in Computer Science #14305)
Par Yan Li, Rui Zhou, Lu Chen, Zhisheng Huang, Manik Sharma. 2023
This book constitutes the refereed proceedings of the 12th International Conference on Health Information Science, HIS 2023, held in Melbourne, VIC, Australia, during October…
23–24, 2023.The 20 full papers and 9 short papers included in this book were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: Depression & Mental Health, Data Security, Privacy & Healthcare Systems, Neurological & Cognitive Disease Studies, COVID-19 Impact Studies, Advanced Medical Data & AI Techniques, Predictive Analysis & Disease Recognition, Medical Imaging & Dataset Exploration, Elderly Care and Knowledge Systems.Intelligent Robotics and Applications: 16th International Conference, ICIRA 2023, Hangzhou, China, July 5–7, 2023, Proceedings, Part III (Lecture Notes in Computer Science #14269)
Par Honghai Liu, Zhouping Yin, Huayong Yang, Lianqing Liu, Geng Yang, Jun Zou, Xiaoping Ouyang, Zhiyong Wang. 2023
The 9-volume set LNAI 14267-14275 constitutes the proceedings of the 16th International Conference on Intelligent Robotics and Applications, ICIRA 2023,…
which took place in Hangzhou, China, during July 5–7, 2023.The 413 papers included in these proceedings were carefully reviewed and selected from 630 submissions. They were organized in topical sections as follows:Part I: Human-Centric Technologies for Seamless Human-Robot Collaboration; Multimodal Collaborative Perception and Fusion; Intelligent Robot Perception in Unknown Environments; Vision-Based Human Robot Interaction and Application.Part II: Vision-Based Human Robot Interaction and Application; Reliable AI on Machine Human Reactions; Wearable Sensors and Robots; Wearable Robots for Assistance, Augmentation and Rehabilitation of Human Movements; Perception and Manipulation of Dexterous Hand for Humanoid Robot.Part III: Perception and Manipulation of Dexterous Hand for Humanoid Robot; Medical Imaging for Biomedical Robotics; Advanced Underwater Robot Technologies; Innovative Design and Performance Evaluation of Robot Mechanisms; Evaluation of Wearable Robots for Assistance and Rehabilitation; 3D Printing Soft Robots.Part IV: 3D Printing Soft Robots; Dielectric Elastomer Actuators for Soft Robotics; Human-like Locomotion and Manipulation; Pattern Recognition and Machine Learning for Smart Robots.Part V: Pattern Recognition and Machine Learning for Smart Robots; Robotic Tactile Sensation, Perception, and Applications; Advanced Sensing and Control Technology for Human-Robot Interaction; Knowledge-Based Robot Decision-Making and Manipulation; Design and Control of Legged Robots.Part VI: Design and Control of Legged Robots; Robots in Tunnelling and Underground Space; Robotic Machining of Complex Components; Clinically Oriented Design in Robotic Surgery and Rehabilitation; Visual and Visual-Tactile Perception for Robotics.Part VII: Visual and Visual-Tactile Perception for Robotics; Perception, Interaction, and Control of Wearable Robots; Marine Robotics and Applications; Multi-Robot Systems for Real World Applications; Physical and Neurological Human-Robot Interaction.Part VIII: Physical and Neurological Human-Robot Interaction; Advanced Motion Control Technologies for Mobile Robots; Intelligent Inspection Robotics; Robotics in Sustainable Manufacturing for Carbon Neutrality; Innovative Design and Performance Evaluation of Robot Mechanisms.Part IX: Innovative Design and Performance Evaluation of Robot Mechanisms; Cutting-Edge Research in Robotics.Provable and Practical Security: 17th International Conference, ProvSec 2023, Wuhan, China, October 20–22, 2023, Proceedings (Lecture Notes in Computer Science #14217)
Par Mingwu Zhang, Man Ho Au, Yudi Zhang. 2023
This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023,…
held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.This book constitutes the refereed post-conference proceedings of the 19th International Conference on Computer Science and Education in Computer Science,…
CSECS 2023, held in June 2023 in Boston, MA, USA.The 23 full papers and 9 short papers were carefully reviewed and selected from 88 submissions. The papers cover many systems technologies, applications, and services as well as solutions. Multiple topics have been addressed including the theory of computation, models of computation, computational complexity and cryptography, logic, design, and analysis of algorithms, network architectures, performance evaluation, network services, software engineering, software creation, and management, applied computing, machine learning, and education.Artificial Intelligence: A Textbook
Par Charu C. Aggarwal. 2021
This textbook covers the broader field of artificial intelligence. The chapters for this textbook span within three categories:Deductive reasoning methods: These…
methods start with pre-defined hypotheses and reason with them in order to arrive at logically sound conclusions. The underlying methods include search and logic-based methods. These methods are discussed in Chapters 1through 5.Inductive Learning Methods: These methods start with examples and use statistical methods in order to arrive at hypotheses. Examples include regression modeling, support vector machines, neural networks, reinforcement learning, unsupervised learning, and probabilistic graphical models. These methods are discussed in Chapters~6 through 11. Integrating Reasoning and Learning: Chapters~11 and 12 discuss techniques for integrating reasoning and learning. Examples include the use of knowledge graphs and neuro-symbolic artificial intelligence.The primary audience for this textbook are professors and advanced-level students in computer science. It is also possible to use this textbook for the mathematics requirements for an undergraduate data science course. Professionals working in this related field many also find this textbook useful as a reference.Integral Methods in Science and Engineering: Analytic and Computational Procedures
Par Christian Constanda, Paul J. Harris, Bardo E. J. Bodmann. 2023
This volume contains a collection of articles on state-of-the-art developments in the construction of theoretical integral techniques and their application…
to specific problems in science and engineering. Chapters in this book are based on talks given at the Seventeenth International Conference on Integral Methods in Science and Engineering, held virtually in July 2022, and are written by internationally recognized researchers. This collection will be of interest to researchers in applied mathematics, physics, and mechanical, electrical, and petroleum engineering, as well as graduate students in these disciplines and other professionals for whom integration is an essential working tool.Agile Datenkompetenz: Reporting-Prozesse mit und ohne Excel gestalten
Par Andrea Weichand. 2023
In diesem Buch hinterfragt Andrea Weichand die bestehenden Reporting-Routinen. Die manuelle Arbeit im bekannten Tabellenkalkulationsprogramm Excel hat sich nicht nur…
etabliert, sie nimmt auch weiterhin zu. Dies ist ein großes Problem für die Innovations- und Zukunftsfähigkeit so mancher Controlling-, Sales-, oder Marketingabteilungen. Wie datenkompetent ist ein Unternehmen, wenn ein Großteil der Datenarbeit in Excel zurechtgeschustert wird? Wie schafft man es im Berufsalltag, Daten effizient und mit hoher Qualität in passende Datenprodukte zu bringen? Welche Rolle spielt die Pivot-Tabelle? Weichand beschreibt einen neuen Weg zu mehr Datenkompetenz und erklärt, warum die Prinzipien Kreativität, Strategie und Agilität so wertvoll dabei sind. Ihr Ziel ist es, all die Angestellten, die sich Tag für Tag mit ihren anstrengenden und monströsen Excel-Dateien quälen, zu ermutigen,die Datenprozesse (mit und ohne Excel) zu automatisieren,die eigene Datenkompetenz weiterzuentwickeln undeine kreative, zukunftsfähige Perspektive für agile Datenarbeit einzunehmen.