Résultats de recherche de titre
Articles 1 à 20 sur 7852
AI Applications to Communications and Information Technologies: The Role of Ultra Deep Neural Networks
Par Daniel Minoli, Benedict Occhiogrosso. 2024
AI Applications to Communications and Information Technologies Apply the technology of the future to networking and communications. Artificial intelligence, which…
enables computers or computer-controlled systems to perform tasks which ordinarily require human-like intelligence and decision-making, has revolutionized computing and digital industries like few other developments in recent history. Tools like artificial neural networks, large language models, and deep learning have quickly become integral aspects of modern life. With research and development into AI technologies proceeding at lightning speeds, the potential applications of these new technologies are all but limitless. AI Applications to Communications and Information Technologies offers a cutting-edge introduction to AI applications in one particular set of disciplines. Beginning with an overview of foundational concepts in AI, it then moves through numerous possible extensions of this technology into networking and telecommunications. The result is an essential introduction for researchers and for technology undergrad/grad student alike. AI Applications to Communications and Information Technologies readers will also find: In-depth analysis of both current and evolving applications Detailed discussion of topics including generative AI, chatbots, automatic speech recognition, image classification and recognition, IoT, smart buildings, network management, network security, and more An authorial team with immense experience in both research and industry AI Applications to Communications and Information Technologies is ideal for researchers, industry observers, investors, and advanced students of network communications and related fields.Queen Elizabeth and the Revolt of the Netherlands
Par Charles Wilson. 2023
This title is part of UC Press's Voices Revived program, which commemorates University of California Press’s mission to seek out…
and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1970.The Greek State at War, Part V
Par W. Kendrick Pritchett. 2023
The volumes of The Greek State at War are an essential reference for the classical scholar. Professor Pritchett has systematically…
canvassed ancient texts and secondary literature for references to specific topics; each volume explores a unique aspect of Greek military practice. In Part V he takes up stone throwers, slingers, and booty.Alexander the Great and the Logistics of the Macedonian Army
Par Donald W. Engels. 2023
"The most important work on Alexander the Great to appear in a long time. Neither scholarship nor semi-fictional biography will…
ever be the same again. . . .Engels at last uses all the archaeological work done in Asia in the past generation and makes it accessible. . . . Careful analyses of terrain, climate, and supply requirements are throughout combined in a masterly fashion to help account for Alexander's strategic decision in the light of the options open to him...The chief merit of this splendid book is perhaps the way in which it brings an ancient army to life, as it really was and moved: the hours it took for simple operations of washing and cooking and feeding animals; the train of noncombatants moving with the army. . . . this is a book that will set the reader thinking. There are not many books on Alexander the Great that do."—New York Review of BooksImperatores Victi: Military Defeat and Aristocractic Competition in the Middle and Late Republic
Par Nathan S. Rosenstein. 2023
Given the intense competition among aristocrats seeking public office in the middle and late Roman Republic, one would expect that…
their persistent struggles for honor, glory, and power could have seriously undermined the state or damaged the cohesiveness of the ruling class. Rome in fact depended on aristocratic competition, since no professional bureaucracy directed public affairs and no salary was attached to any public office. But as Rosenstein adeptly shows, competition appears to have been surprisingly limited, in ways that curtailed the possible destructive effects of all-out contests between individuals.Imperatores Victi examines one particularly striking case of such checks on competition. Military success at all times represented an abundant source of prestige and political strength at Rome. Generals who led armies to victory enjoyed a better-than-average chance of securing higher office upon their return from the field. Yet this study demonstrates that defeated generals were not barred from public office and in fact went on to win the Republic's most highly coveted and hotly contested offices in numbers virtually identical with those of their undefeated peers. Rosenstein explores how this unexpected limit to competition functions, reviewing beliefs about the religious origins of defeat, assumptions about common soldiers' duties in battle, and definitions of honorable behavior of an aristocrat during a crisis. These perspectives were instrumental in shifting the onus of failure away from a general's person and in offering positive strategies a general might use to win glory and respect even in defeat and to silence potential critics among a failed general's peers. Such limits to competition had an impact on the larger problems of stability and coherence in the Republic and its political elite; these larger problems are discussed in the concluding chapter. This title is part of UC Press's Voices Revived program, which commemorates University of California Press’s mission to seek out and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1990.Winners in Peace: MacArthur, Yoshida, and Postwar Japan
Par Richard B. Finn. 2023
Singular for its breadth and balance, Winners in Peace chronicles the American Occupation of Japan, an episode that profoundly shaped…
the postwar world. Richard B. Finn, who participated in the Occupation as a young naval officer and diplomat, tells the full story of the activities from 1945 to 1952. He focuses on the two main actors, General Douglas MacArthur and Japanese Prime Minister Shigeru Yoshida, and details the era's major events, programs, and personalities, both American and Japanese. Finn draws on an impressive range of sources—American, Japanese, British, and Australian—including interviews with nearly one hundred participants in the Occupation. He describes the war crimes trials, constitutional reforms, and American efforts to rebuild Japan. The work of George Kennan in making political stability and economic recovery the top goals of the United States became critical in the face of the developing Cold War.Winners in Peace will aid our understanding of Japan today—its economic growth, its style of government, and the strong pacifist spirit of its people. This title is part of UC Press's Voices Revived program, which commemorates University of California Press’s mission to seek out and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1992.On the Wings of War and Peace: The RCAF during the Early Cold War
Par William March, Randall Wakelam, Peter Rayls. 2023
Bringing together leading researchers on Canadian air power, On the Wings of War and Peace captures the history of the…
Royal Canadian Air Force (RCAF) during the first decades of the Cold War – a period which marked the zenith of air force accomplishments in peacetime Canada. The volume covers topics that go beyond straightforward flying operations, examining policies that drove operational needs and capabilities and the personnel, technical, and logistical functions that made those operations possible. With contributions written by former RCAF members who have both expert and personal knowledge of their topics, On the Wings of War and Peace brings new perspectives to the RCAF’s role in shaping the modern Canadian nation.Kosovo: How Myths and Truths Started a War
Par Julie A. Mertus. 1999
Julie Mertus provides one of the first comprehensive looks at the explosive situation in Kosovo, where years of simmering tensions…
between Serbs and Albanians erupted in armed conflict in 1998. In a profound and detailed study of national identity and ethnic conflict, Mertus demonstrates how myths and truths can start a war. She shows how our identity as individuals and as members of groups is defined through the telling and remembering of stories. Real or imagined, these stories shape our understanding of ourselves as heroes, martyrs, conquerors, or victims. Once we see ourselves as victims, Mertus claims, we feel morally justified to become perpetrators.Based on a series of interviews conducted in Kosovo, Serbia proper, and Macedonia, this book is one of the first extended treatments of the years leading to war in Kosovo. Mertus examines the formation of Serbian national identity, and closely scrutinizes the hostilities of the region. She shows how myth and experience inform the political ideologies of Kosovo, and explores how these competing beliefs are created and perpetuated. This sobering overview of the region provides a window into a complex struggle whose repercussions reach far into the international community.Frontiers of Supercomputing II: A National Reassessment (Los Alamos Series in Basic and Applied Sciences #13)
Par Karyn R. Ames, Alan Brenner. 2023
This uniquely comprehensive book brings together the vast amount of technical, economic, and political information and the analyses of supercomputing…
that have hitherto been buried in the frequently inaccessible "gray literature." Seventy-nine distinguished participants in the second Frontiers of Supercomputing conference offer perceptive and often controversial views on the emerging computing environment in the United States. This title is part of UC Press's Voices Revived program, which commemorates University of California Press’s mission to seek out and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1994.Big Witch Energy: Power Spells for Modern Witches
Par Semra Haksever. 2023
If you've ever felt oppressed, angry at the patriarchy, been ghosted or experienced a bad case of imposter syndrome, this…
book is just the magical elixir you've been waiting for.Join expert witch Semra Haksever as she invites you to summon your Big Witch Energy and awaken the abundance of power within.Filled with spells and rituals that are perfect for novice witches and seasoned spellcasters alike, Semra encourages you to practise radical self-acceptance, be comfortable and confident in your skin and to question society's expectations. There's a spell to help stop people-pleasing, a 'protective shield' body lotion and a foot scrub that will encourage you to walk your own path. As well as this, there are practical spells to call in money and good luck, banish negativity and much more.This collection of spells will enable you connect with the best version of yourself and truly feel your power. So, step into the magic and embrace your Big Witch Energy.Decision-Making for Defense
Par Charles J. Hitch. 2023
When President Kennedy appointed Robert McNamara Secretary of Defense in January, 1961 and McNamara called on Charles Hitch to join…
him, a new era of defense policy leadership was clearly at hand. Great problems of organization had emerged along with vast increases in American responsibility for the security of the free world in the post-war era of rapidly changing military technology. Defense department unification and other controversial questions of organization of the defense establishment assumed new dimensions with the advent of the new techniques of planning and analysis. Hitch discusses, from the rare perspective of an analytically gifted insider, how the Department of Defense achieved balanced programs and more effective forces through the firm application of the new management techniques without sweeping changes of organization structure. Important challenges still lie ahead. As Hitch says: "The objectives, the organization, and the management techniques of national defense are all interrelated. Organization and procedures must be adapted to our changing nationaal policies and objectives as well as to changes in the character of our resources and technologies. It will take all our ingenuity and skill to make these necessary adaptations so that we can continue to provide unified management of so great an enterprise as our present military establishment. At the beginning of our Constitutional history the building of three frigates and the management of a few companies to fight Indians were considered too great a task for the War Department alone." Management of the American defense establishment has been a subject of fascination, concern and occasional despair to generation of Presidents, legislators, military leaders, and informed citizens. Hitch provides historical perspective on these tasks of decision-making for national security, and he explains clearly and succinctly the contemporary problems of fitting together strategic alternatives, weapons technology, and economic resources to achieve a rational pattern of defense management. The modern tools for this task are new techniques of planning, programming, and budgeting, and, for evaluating complex situations, the methods of systems analysis, all of which are discussed in detail. Hitch was involved both in the origination of these management techniques while at the RAND Corporation and in the tremendous task of putting them to consistent, far reaching, and practical use in the Department of Defense. President Johnson termed Hitch "a principal architect of America's modern defense establishment . . . It is largely as a result of [his] efforts that this country now possesses the most balanced, flexible, combat-ready defense force in history and management system to maintain our superior military posture and use it with precision." This title is part of UC Press's Voices Revived program, which commemorates University of California Press's mission to seek out and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1965.Hybrid Threats, Cyberterrorism and Cyberwarfare
Par Helge Janicke, Ioanna Kantzavelou, Leandros Maglaras, Mohamed Amine Ferrag. 2024
Nowadays, in Cyberspace there is a burst of information that everyone has access. However, apart from the advantages the Internet…
offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term, encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict etc and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike. ‘Cyber-conflict’ and ‘cyber-war’ serve as examples of the use of new technologies within the scope of hybrid threats. Cyber-war basically refers to a sustained computer-based cyber-attack by a state against the IT infrastructure of a target state. On the other hand cyber-security is a major factor that shapes productivity and efficiency of the modern industry in both technical and economic terms. The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threats, sector specific cyber-attacks that have the form of cyberterrorism and presents the recent actions that EU, USA and other Nations have taken in order to strengthen their systems against such attacks. There has never been a higher risk of a major catastrophe as a result of the rise in offensive cyber activity, particularly the possibility of cyber-physical strikes against critical services. Recent cyber-attacks against critical infrastructures along with the continuous migration crisis have been the main driving forces that led to the decision to publish this book.The Science of Esports
Par Matthew Watson, Craig McNulty, Remco Polman, Kabir Bubna. 2024
The Science of Esports draws from contemporary research and coach expertise to examine esports athlete health and performance from a…
range of disciplinary perspectives, including physiology, psychology, sociology, and nutrition. The rapid expansion of the esports industry has elevated competitive video gaming into the realm of high performance, requiring players, coaches, and practitioners to implement interdisciplinary approaches to performance support. The book covers key topic areas such as: What esports is and similarities and differences to sport Game-specific training Physiological and psychological consideration for esports athletes Social aspects of player performance and the social environment of esports Esports coaching and structure of esports performance environments Technology and its use in esports Safeguarding, cheating, and gambling This book includes worked examples and case studies to allow immediate implementation into practice for esports athletes and coaches. It summarises the current state of research to inform researchers and identify gaps in knowledge. This book is critical reading for students of esports and related courses. It serves as the first scientific resource designed to provide athletes, coaches, and practitioners with interdisciplinary insights into esports health and performance.Information and Communications Technologies for Smart Cities and Societies (The City Project #5)
Par Roberto Menozzi. 2024
This book offers an overview of digital, IoT and intelligent technologies, applications and solutions that are contributing to shape the…
digital, inclusive, and sustainable transformation of contemporary cities. Based on peer-reviewed contributions to the workshop "Information and Communications Technologies for Smart Cities and Societies", held on December 2, 2022, at the University of Parma, Italy, it offers a multidisciplinary, authoritative snapshot for researchers, architects, and engineers, as well as professionals and policy makers, involved in planning the city of the future. The book describes practical case studies, discussing challenges and opportunities of the integration of ICTs in the planning and management of future cities.Solvable Cellular Automata: Methods and Applications (Understanding Complex Systems)
Par Henryk Fukś. 2023
The main focus of the book is solvability of cellular automata, that is, expressing the state of a given cell…
after a given number of steps by an explicit formula. The author considers solutions of two types of initial value problems for cellular automata, the deterministic one and the probabilistic one. In the first chapter the basic concepts of cellular automata theory are introduced. Deterministic initial value problem is introduced next and solutions for selected simple rules are also presented. In the following chapters various techniques for solving the deterministic problem are introduced, using elementary CA rules of increasing complexity as examples. The second part of the book introduces the concept of probability measure in the context of cellular automata and the probabilistic initial value problem for both deterministic and probabilistic rules. The book is amply illustrated with examples and applications such as the density classification problem, phase transitions in traffic models or the diffusion of innovations model. In the appendix, solution formulae (both deterministic and probabilistic) for over 60 elementary cellular automata rules are listed. Ruelle-Frobenius-Perron equations for all 88 minimal elementary cellular automata are also provided.Development of Safety-Critical Systems: Architecture and Software
Par Gopinath Karmakar, Amol Wakankar, Ashutosh Kabra, Paritosh Pandya. 2023
This book provides professionals and students with practical guidance for the development of safety-critical computer-based systems. It covers important aspects…
ranging from complying with standards and guidelines to the necessary software development process and tools, and also techniques pertaining to model-based application development platforms as well as qualified programmable controllers.After a general introduction to the book’s topic in chapter 1, chapter 2 discusses dependability aspects of safety systems and how architectural design at the system level helps deal with failures and yet achieves the targeted dependability attributes. Chapter 3 presents the software development process which includes verification and validation at every stage, essential to the development of software for systems performing safety functions. It also explains how the process helps in developing a safety case that can be independently verified and validated. The subsequent chapter 4 presents some important standards and guidelines, which apply to different industries and in different countries. Chapter 5 then discusses the steps towards complying with the standards at every phase of development. It offers a guided tour traversing the path of software qualification by exploring the necessary steps towards achieving the goal with the help of case studies. Chapter 6 highlights the application of formal methods for the development of safety systems software and introduces some available notations and tools which assist the process. Finally, chapter 7 presents a detailed discussion on the importance and the advantages of qualified platforms for safety systems application development, including programmable controller (PLC) and formal model-based development platforms. Each chapter includes case studies illustrating the subject matter.The book is aimed at both practitioners and students interested in the art and science of developing computer-based systems for safety-critical applications. Both audiences will get insights into the tools and techniques along with the latest developments in the design, analysis and qualification, which are constrained by the regulatory and compliance requirements mandated by the applicable guides and standards. It also addresses the needs of professionals and young graduates who specialize in the development of necessary tools and qualified platforms.Maia Toll&’s Wild Wisdom series—The Illustrated Herbiary, The Illustrated Bestiary, and The Illustrated Crystallary—introduced readers to the mystical energy of…
the animal, vegetable, and mineral kingdoms. In this capstone to the Wild Wisdom series, Maia Toll's Wild Wisdom Companion guides readers in developing a personalized earth-based spiritual practice using rituals, writing prompts, recipes, symbols, and reflections tied to each season. Organized into 12 chapters—Winter Solstice, Spring Equinox, Summer Solstice, Autumnal Equinox, plus early and late stages of each of the four seasons — the book features seasonal practices; exercises for the body and for writing and reflection; plant, animal, and mineral medicine; and symbolic explorations of the gifts and challenges that arise with seasonal change. Original illustrations by Kate O&’Hara illuminate the symbolic richness of the text, and 28 pop-out oracle cards plus four bound-in pocket pages enhance the invitation for readers to use this interactive guide as an ongoing tool for cultivating the sacred in their own lives.Artificial Intelligence in Cyber Security: Theories and Applications (Intelligent Systems Reference Library #240)
Par Steven Lawrence Fernandes, Tarun Kumar Sharma, Tushar Bhardwaj, Himanshu Upadhyay. 2023
This book highlights the applications and theory of artificial intelligence in the domain of cybersecurity. The book proposes new approaches…
and ideas to present applications of innovative approaches in real-time environments. In the past few decades, there has been an exponential rise in the application of artificial intelligence technologies (such as deep learning, machine learning, blockchain) for solving complex and intricate problems arising in the domain of cybersecurity. The versatility of these techniques has made them a favorite among scientists and researchers working in diverse areas. This book serves as a reference for young scholars, researchers, and industry professionals working in the field of Artificial Intelligence and Cybersecurity.Self-Alteration: How People Change Themselves across Cultures
Par Michael Jackson, Kathryn Rountree, Nigel Rapport, Banu Senay, Max Harwood, Gil Hizi, Muhammad Kavesh, Gisella Orsini, Jaap Timmer. 2024
Many of us feel a pressing desire to be different—to be other than who we are. Self-conscious, we anxiously perceive…
our shortcomings or insufficiencies, wondering why we are how we are and whether we might be different. Often, we wish to alter ourselves, to change our relationships, and to transform the person we are in those relationships. Not only a philosophical question about how other people change, self-alteration is also a practical care—can I change, and how? Self-Alteration: How People Change Themselves across Cultures explores and analyzes these apparently universal hopes and their related existential dilemmas. The essays here come at the subject of the self and its becoming through case studies of modes of transformation of the self. They do this with social processes and projects that reveal how the self acquires a non-trivial new meaning in and through its very process of alteration. By focusing on ways we are allowed to change ourselves, including through religious and spiritual traditions and innovations, embodied participation in therapeutic programs like psychoanalysis and gendered care services, and political activism or relationships with animals, the authors in this volume create a model for cross-cultural or global analysis of social-self change that leads to fresh ways of addressing the 'self' itself.Artificial Life and Evolutionary Computation: 14th Italian Workshop, WIVACE 2019, Rende, Italy, September 18–20, 2019, Revised Selected Papers (Communications in Computer and Information Science #1200)
Par Antonio Guerrieri, Clara Pizzuti, Giandomenico Spezzano, Franco Cicirelli, Andrea Vinci, Annalisa Socievole. 2020
This book constitutes the revised selected papers of the 14th Italian Workshop on Artificial Life and Evolutionary Computation, WIVACE 2019,…
held in Rende, Italy, in September 2019.The 13 full papers and 4 short paper presented were thoroughly reviewed and selected from 31 submissions. They are focused on the topics of information systems, design and analysis of algorithms, artificial intelligence, machine learning, cognitive science, modeling and simulation, collaborative and social computing, parallel computing, distributed computing. The chapter “Nestedness Temperature in the Agent-Artifact Space: Emergence of Hierarchical Order in the 2000-2014 Photonics Techno-Economic Complex System” is available open access under a CC BY 4.0 license.