Browse Results

Showing 34,226 through 34,250 of 54,022 results

10th International Conference on Soft Computing Models in Industrial and Environmental Applications (Advances in Intelligent Systems and Computing #368)

by Bruno Baruque Álvaro Herrero Javier Sedano Héctor Quintián Emilio Corchado

This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 10th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2015), held in the beautiful and historic city of Burgos (Spain), in June 2015. Soft computing represents a collection or set of computational techniques in machine learning, computer science and some engineering disciplines, which investigate, simulate and analyze very complex issues and phenomena. This Conference is mainly focused on its industrial and environmental applications. After a through peer-review process, the SOCO 2015 International Program Committee selected 41 papers, written by authors from 15 different countries. These papers are published in present conference proceedings, achieving an acceptance rate of 40%. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the International Program Committees for their hard work during the review process. This is a crucial issue for creation of a high standard conference and the SOCO conference would not exist without their help.

The 2-tuple Linguistic Model

by Francisco Herrera Rosa M. Rodriguez Luis Martínez

This book examines one of the more common and wide-spread methodologies to deal with uncertainty in real-world decision making problems, the computing with words paradigm, and the fuzzy linguistic approach. The 2-tuple linguistic model is the most popular methodology for computing with words (CWW), because it improves the accuracy of the linguistic computations and keeps the interpretability of the results. The authors provide a thorough review of the specialized literature in CWW and highlight the rapid growth and applicability of the 2-tuple linguistic model. They explore the foundations and methodologies for CWW in complex frameworks and extensions. The book introduces the software FLINTSTONES that provides tools for solving linguistic decision problems based on the 2-tuple linguistic model. Professionals and researchers working in the field of classification or fuzzy sets and systems will find The 2-tuple Linguistic Model: Computing with Words in Decision Making a valuable resource. Undergraduate and postdoctoral students studying computer science and statistics will also find this book a useful study guide.

, 2nd Edition: Introduction, Methods, and Information Systems (International Handbooks on Information Systems)

by Jan Vom Brocke Michael Rosemann

Business Process Management (BPM) has become one of the most widely used approaches for the design of modern organizational and information systems. The conscious treatment of business processes as significant corporate assets has facilitated substantial improvements in organizational performance but is also used to ensure the conformance of corporate activities. This Handbook presents in two volumes the contemporary body of knowledge as articulated by the world' s leading BPM thought leaders. This first volume focuses on arriving at a sound definition of BPM approaches and examines BPM methods and process-aware information systems. As such, it provides guidance for the integration of BPM into corporate methodologies and information systems. Each chapter has been contributed by leading international experts. Selected case studies complement their views and lead to a summary of BPM expertise that is unique in its coverage of the most critical success factors of BPM.<P><P> The second edition of this handbook has been significantly revised and extended. Each chapter has been updated to reflect the most current developments. This includes in particular new technologies such as in-memory data and process management, social media and networks. A further focus of this revised and extended edition is on the actual deployment of the proposed theoretical concepts. This volume includes a number of entire new chapters from some of the world's leading experts in the domain of BPM.

3D Cinema

by Miriam Ross

3D Cinema: Optical Illusions and Tactile Experiences questions the common frameworks used for discussing 3D cinema, realism and spectacle, in order to fully understand the embodied and sensory dimensions of 3D cinema's unique visuality.

3D Printing (Idiot's Guides)

by Cameron Coward

3D printing is the hottest new technology. It allows just about any at-home inventor, artist, or engineer to design, create, and "print" their own parts, artwork, or whatever else can be imagined — all at very reasonable costs. Idiot's Guides: 3D Printing explores this new revolution by explaining all of the basics of materials, parts, software, modeling, design, and finishing. The book then takes it to the next level by teaching readers how to take their new skills and print some simple, fun projects. Helpful advice on setting up a home-built 3D printer, buying a manufactured printer, selecting raw materials, and finding plans and projects online, are also covered.

5 Skills for the Global Learner: What Everyone Needs to Navigate the Digital World (Corwin Connected Educators Series)

by Mark D. Barnes

Tap the power of digital learning! In today’s digital world, distance and cultural differences are inconsequential. Technology empowers students and provides them with unlimited resources and opportunities. With this easy guide, you’ll learn the five essential skills to transform students into global learners: Creating and sharing digital information Using social media Digital publishing Building a personal learning network Using aggregators to create, maintain, and share content Loaded with tips and examples for using PLNs, Facebook, Twitter, Skype, YouTube, Jing, and other essential tools, this breakthrough guide to incredible learning opportunities will keep you and your students a step ahead!

5 Skills for the Global Learner: What Everyone Needs to Navigate the Digital World (Corwin Connected Educators Series)

by Mark D. Barnes

Tap the power of digital learning! In today’s digital world, distance and cultural differences are inconsequential. Technology empowers students and provides them with unlimited resources and opportunities. With this easy guide, you’ll learn the five essential skills to transform students into global learners: Creating and sharing digital information Using social media Digital publishing Building a personal learning network Using aggregators to create, maintain, and share content Loaded with tips and examples for using PLNs, Facebook, Twitter, Skype, YouTube, Jing, and other essential tools, this breakthrough guide to incredible learning opportunities will keep you and your students a step ahead!

9th International Conference on Practical Applications of Computational Biology and Bioinformatics (Advances in Intelligent Systems and Computing #375)

by Ross Overbeek Miguel P. Rocha Florentino Fdez-Riverola Juan F. Paz

This proceedings presents recent practical applications of Computational Biology and Bioinformatics. It contains the proceedings of the 9th International Conference on Practical Applications of Computational Biology & Bioinformatics held at University of Salamanca, Spain, at June 3rd-5th, 2015. The International Conference on Practical Applications of Computational Biology & Bioinformatics (PACBB) is an annual international meeting dedicated to emerging and challenging applied research in Bioinformatics and Computational Biology. Biological and biomedical research are increasingly driven by experimental techniques that challenge our ability to analyse, process and extract meaningful knowledge from the underlying data. The impressive capabilities of next generation sequencing technologies, together with novel and ever evolving distinct types of omics data technologies, have put an increasingly complex set of challenges for the growing fields of Bioinformatics and Computational Biology. The analysis of the datasets produced and their integration call for new algorithms and approaches from fields such as Databases, Statistics, Data Mining, Machine Learning, Optimization, Computer Science and Artificial Intelligence. Clearly, Biology is more and more a science of information requiring tools from the computational sciences.

Abortion Politics, Mass Media, and Social Movements in America

by Deana A. Rohlinger

"Weaving together analyses of archival material, news coverage, and interviews conducted with journalists from mainstream and partisan outlets as well as with activists across the political spectrum, Deana A. Rohlinger reimagines how activists use a variety of mediums, sometimes simultaneously, to agitate for - and against - legal abortion"--

Abuse: An Encyclopedia Of Causes, Consequences, And Treatments

by Rosemarie Skaine

Abuse, a key theme of health education curricula, is also a major issue faced by many segments of society. Intended for high school students as well as undergraduates and the general reader, this comprehensive encyclopedia explores abuse in all its forms--physical, sexual, emotional, and verbal--among a variety of age and demographic groups from children to the elderly to the disabled. It sheds light on causes and symptoms of abuse, examines lasting impacts, and suggests avenues for prevention and treatment. <P><P> Specific topics of concern to a secondary school audience include bullying and cyberbullying; abuse of those in same-sex relationships; and sexual abuse through rape, date rape, incest, and sexting. Elder abuse, which has become of greater concern as our society ages, is covered, as are domestic abuse, child abuse, and abduction. Through up-to-date entries by expert contributors, readers will learn about the causes and results of specific types of abuse, as well as their legal and sociological dimensions. The title will also serve as a gateway to further study--and as a resource for readers seeking help.

Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts

by Nitesh Dhanjani

The upcoming IoT age will blur the line between our physical and online lives. Attacks targeting our online spaces will put our physical security at risk. Traditionally, the attack vectors to our fundamental luxuries have required physical tampering, mostly because access to the infrastructure has been limited from the Internet. This is about to change with the upcoming disruption caused by a future with billions of "things" connected to the Internet.This book takes a fascinating look into abusing the most popular IoT-based devices already available in the market. You'll learn how a simple attack can cause a perpetual blackout targeting LED lightbulbs, how bad security decisions have grossly violated the physical safety and privacy of families, and how the insecurity of powerful electric vehicles can put your life at risk.The goal of this book is to demonstrate tangible risk in IoT devices that we're going to depend on more and more as time progresses. Once we begin to understand the cause of actual security vulnerabilities in devices today, we will begin to set the path for a future that will help us enable these devices to securely enhance and augment our lives.The stakes are high. Malicious attackers are already hard at work uncovering and exploiting these security defects and they will continue to find crafty avenues to abuse their knowledge every way they can. These attackers span the spectrum of curious college students to sophisticated private and state sponsored criminal gangs that are interested in terrorizing individuals and populations. The impact of security vulnerabilities in IoT devices can lead to mass compromise of privacy and cause physical harm.

Academic Bildung in Net-based Higher Education: Moving beyond learning (Routledge Research in Higher Education)

by Trine Fossland Helle Mathiasen Mariann Solberg

The explosive emergence of net-based learning in higher education brings with it new possibilities and constraints in teaching and learning environments.This edited collection considers how the concept of Academic Bildung - a term suggesting a personal educational process beyond actual educational learning - can be applied to net-based higher education. The book is drawing on Scandinavian research to address the topic from both a theoretical and practical standpoint.Chapters explore the facilitation of online courses and argue how and why universities should involve dimensions of Academic Bildung on both a strategic and technological pedagogical content level. The book is structured in three parts: Part I frames the current state of net-based learning and introduces Bildung as a concept; Part II contains a set of four case studies in Norway, Sweden and Denmark, also including a fifth study that looks at Scandinavian approaches to teaching and learning in comparison with data from the USA, the UK, Australia and Canada; Part III provides a synthesis of theories and cases to examine whether a Scandinavian orientation can be discerned. Contributions suggest that in order to address one of the fundamental functions of higher education, the ability to produce new knowledge, the Academic Bildung of the students has to be in focus. Grounded in theoretical and empirical discussion, this book will appeal to researchers and academics in the field of higher education as well as personnel who work with teaching and learning with technology, and academics interested in the question of Academic Bildung.

Accountability and Security in the Cloud: First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures (Lecture Notes in Computer Science #8937)

by Massimo Felici Carmen Fernández-Gago

The First A4Cloud Summer School has been one of the first events in the area of accountability and security in the cloud. It was organized by the EU-funded A4Cloud project, in collaboration with the European projects CIRRUS, Coco Cloud, CUMULUS, and SPECS. Cloud computing is a key technology that is being adopted progressively by companies and users across different application domains and industries. Yet, there are emerging issues such as security, privacy, and data protection. The 13 contributions included in this volume cover the state of the art and provide research insights into the following topics: accountability in the cloud; privacy and transparency in the cloud; empirical approaches for the cloud; socio-legal aspects of the cloud; cloud standards; and the accountability glossary of terms and definitions.

Accumulo

by Billie Rinaldi Aaron Cordova Michael Wall

Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google's BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level security.With clear information on system administration, performance tuning, and best practices, this book is ideal for developers seeking to write Accumulo applications, administrators charged with installing and maintaining Accumulo, and other professionals interested in what Accumulo has to offer. You will find everything you need to use this system fully.Get a high-level introduction to Accumulo's architecture and data modelTake a rapid tour through single- and multiple-node installations, data ingest, and queryLearn how to write Accumulo applications for several use cases, based on examplesDive into Accumulo internals, including information not available in the documentationGet detailed information for installing, administering, tuning, and measuring performanceLearn best practices based on successful implementations in the fieldFind answers to common questions that every new Accumulo user asks

Acoustic Modeling for Emotion Recognition (SpringerBriefs in Speech Technology)

by Koteswara Rao Anne Swarna Kuchibhotla Hima Deepthi Vankayalapati

This book presents state of art research in speech emotion recognition. Readers are first presented with basic research and applications - gradually more advance information is provided, giving readers comprehensive guidance for classify emotions through speech. Simulated databases are used and results extensively compared, with the features and the algorithms implemented using MATLAB. Various emotion recognition models like Linear Discriminant Analysis (LDA), Regularized Discriminant Analysis (RDA), Support Vector Machines (SVM) and K-Nearest neighbor (KNN) and are explored in detail using prosody and spectral features, and feature fusion techniques.

Active Directory with PowerShell

by Uma Yellapragada

If you are looking to automate repetitive tasks in Active Directory management using the PowerShell module, then this book is for you. Any experience in PowerShell would be an added advantage.

Activity Learning

by Narayanan C. Krishnan Diane J. Cook

Defines the notion of an activity model learned from sensor data and presents key algorithms that form the core of the field Activity Learning: Discovering, Recognizing and Predicting Human Behavior from Sensor Data provides an in-depth look at computational approaches to activity learning from sensor data. Each chapter is constructed to provide practical, step-by-step information on how to analyze and process sensor data. The book discusses techniques for activity learning that include the following: Discovering activity patterns that emerge from behavior-based sensor data Recognizing occurrences of predefined or discovered activities in real time Predicting the occurrences of activities The techniques covered can be applied to numerous fields, including security, telecommunications, healthcare, smart grids, and home automation. An online companion site enables readers to experiment with the techniques described in the book, and to adapt or enhance the techniques for their own use.With an emphasis on computational approaches, Activity Learning: Discovering, Recognizing, and Predicting Human Behavior from Sensor Data provides graduate students and researchers with an algorithmic perspective to activity learning.

Ad-hoc, Mobile, and Wireless Networks: 14th International Conference, ADHOC-NOW 2015, Athens, Greece, June 29 -- July 1, 2015, Proceedings (Lecture Notes in Computer Science #9143)

by Symeon Papavassiliou Stefan Ruehrup

This book constitutes the proceedings of the 14th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2015, held in Athens, Greece in June/July 2015. The 25 full papers presented in this volume were carefully reviewed and selected from 52 submissions. The book also contains 3 full-paper invited talks. The contributions are organized in topical sections named: routing, connectivity, and resource allocation; localization, sensor deployment, and mobility management; distributed computing with mobile agents; efficient, reliable, and secure smart energy networks; and emerging communications, networking and computing technologies for VANETs 2. 0.

Ad-hoc Networks and Wireless: ADHOC-NOW 2014 International Workshops, ETSD, MARSS, MWaoN, SecAN, SSPA, and WiSARN, Benidorm, Spain, June 22--27, 2014, Revised Selected Papers (Lecture Notes in Computer Science #8629)

by Miguel Garcia Pineda Jaime Lloret Symeon Papavassiliou Stefan Ruehrup Carlos Becker Westphall

This book constitutes the refereed proceedings of six workshops collocated with the 13th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW Workshops 2014, held in Benidorm, Spain, in June 2014. The 25 revised full papers presented were carefully reviewed and selected from 59 submissions. The papers address the following topics: emerging technologies for smart devices; marine sensors and systems; multimedia wireless ad hoc networks; security in ad hoc networks; smart sensor protocols and algorithms; wireless sensor, actuator and robot networks.

Adaptive Biometric Systems: Recent Advances and Challenges (Advances in Computer Vision and Pattern Recognition)

by Ajita Rattani Fabio Roli Eric Granger

This interdisciplinary volume presents a detailed overview of the latest advances and challenges remaining in the field of adaptive biometric systems. A broad range of techniques are provided from an international selection of pre-eminent authorities, collected together under a unified taxonomy and designed to be applicable to any pattern recognition system. Features: presents a thorough introduction to the concept of adaptive biometric systems; reviews systems for adaptive face recognition that perform self-updating of facial models using operational (unlabeled) data; describes a novel semi-supervised training strategy known as fusion-based co-training; examines the characterization and recognition of human gestures in videos; discusses a selection of learning techniques that can be applied to build an adaptive biometric system; investigates procedures for handling temporal variance in facial biometrics due to aging; proposes a score-level fusion scheme for an adaptive multimodal biometric system.

Adaptive Resource Management and Scheduling for Cloud Computing: First International Workshop, ARMS-CC 2014, held in Conjunction with ACM Symposium on Principles of Distributed Computing, PODC 2014, Paris, France, July 15, 2014, Revised Selected Papers (Lecture Notes in Computer Science #8907)

by Florin Pop Maria Potop-Butucaru

This book constitutes the thoroughly refereedpost-conference proceedings of the Second International Workshop on AdaptiveResource Management and Scheduling for Cloud Computing, ARMS-CC 2015, held inConjunction with ACM Symposium on Principles of Distributed Computing, PODC2015, in Donostia-San Sebastián, Spain, in July 2015. The 12 revised full papers, including 1 invited paper,were carefully reviewed and selected from 24 submissions. The papers haveidentified several important aspects of the problem addressed by ARMS-CC:self-* and autonomous cloud systems, cloud quality management and service levelagreement (SLA), scalable computing, mobile cloud computing, cloud computingtechniques for big data, high performance cloud computing, resource managementin big data platforms, scheduling algorithms for big data processing, cloudcomposition, federation, bridging, and bursting, cloud resource virtualizationand composition, load-balancing and co-allocation, fault tolerance,reliability, and availability of cloud systems.

ADOBE Design Collection Creative Cloud Revealed

by Chris Botello Elizabeth Eisner Reding

THE DESIGN COLLECTION REVEALED CREATIVE CLOUD provides comprehensive step-by-step instruction and in-depth explanation for three of today's most widely used design and layout programs: Adobe InDesign Creative Cloud, Adobe Photoshop Creative Cloud, and Adobe Illustrator Creative Cloud. Your students will gain practical experience with the software as they work through end-of-chapter learning projects and step-by-step tutorials. An integration chapter demonstrates how to move from one application to the other. Full-color illustrations and a user-friendly design combine to create a robust learning experience that reveals how to master the latest features of Adobe's popular design suite.

Adobe® Dreamweaver® Creative Cloud™, Comprehensive (Stay Current With Adobe Creative Cloud Ser.)

by Corinne L. Hoisington Jessica L. Minnick

NIMAC-sourced textbook

Adobe Dreamweaver Creative Cloud, Revealed: Adobe Dreamweaver Cs6, Flash Cs6 And Fireworks Cs6 (Stay Current With Adobe Creative Cloud Ser.)

by Sherry Bishop

NIMAC-sourced textbook

Adobe Illustrator Creative Cloud, Revealed (Stay Current With Adobe Creative Cloud Ser.)

by Chris Botello

NIMAC-sourced textbook

Refine Search

Showing 34,226 through 34,250 of 54,022 results