Browse Results

Showing 22,826 through 22,850 of 28,747 results

Second Grade Math With Confidence Student Workbook (Math With Confidence Ser.)

by Kate Snow

A colorful, engaging workbook to reinforce and practice the skills taught in the Second Grade Math with Confidence Instructor Guide. Simple and straightforward workbook pages give children practice with new concepts and provide daily reviews of previously learned skills. Short, simple pages give children written practice without tiring small hands Daily review helps children retain what they have learned. All answers are provided in the Instructor’s Guide for easy correcting Colorful, whimsical illustrations Age Range: 7-8 Grade Range: Second Grade full-color illustrations on every page.

Second International Handbook of Mathematics Education (Springer International Handbooks of Education #10)

by Alan J. Bishop

ALAN 1. BISHOP The first International Handbook on Mathematics Education was published by Kluwer Academic Publishers in 1996. However, most of the writing for that handbook was done in 1995 and generally reflected the main research and development foci prior to 1994. There were four sections, 36 chapters, and some 150 people contributed to the final volume either as author, reviewer, editor, or critical friend. The task was a monumental one, attempting to cover the major research and practice developments in the international field of mathematics education as it appeared to the contributors in 1995. Inevitably there were certain omissions, some developments were only starting to emerge, and some literatures were only sketchy and speculative. However that Handbook has had to be reprinted three times, so it clearly fulfilled a need and I personally hope that it lived up to what I wrote in its Introduction: The Handbook thus attempts not merely to present a description of the international 'state-of-the-field', but also to offer synthetic and reflective overviews on the different directions being taken by the field, on the gaps existing in our present knowledge, on the current problems being faced, and on the future possibilities for development. (Bishop et aI. , 1996) Since that time there has been even more activity in our field, and now seems a good time to take stock again, to reflect on what has happened since 1995, and to create a second Handbook with the same overall goals.

Second International Handbook on the Demography of Sexuality (International Handbooks of Population #14)

by Amanda K. Baumle Zelma Oyarvide Tuthill

A decade after the publication of the first International Handbook on the Demography of Sexuality, there have been fundamental shifts in how we measure sexual and gender identities and the breadth of available population-level sexuality data. The chapters in this second edition of this handbook provide guidance on methodological approaches involved in studying population sexuality, as well as insight into the ways that sexuality shapes key demographic outcomes. Chapters examine how we measure sexual identities and behaviors on surveys, sexuality changes across the life course, international perspectives on sexual behaviors and identities, and the ways that sexual identities shape families, labor market experiences, and health outcomes. Despite these developments, we still know relatively little about key demographic questions related to fertility and migration for sexual minorities, as well as about understudied topics of sexuality that fall outside of risk-focused analyses. In particular, much of our understanding of sexuality has been motivated by controlling the spread of sexually transmitted infections or adolescent pregnancies, rather than understanding motivations for sexual interactions, such as pleasure. Accordingly, although the research set forth in this book provides insight into existing knowledge of sexual behavior and of sexual minority populations, the chapters also point researchers and policymakers toward needed areas of research and data collection.

Second Order Elliptic Integro-Differential Problems (Chapman & Hall/CRC Research Notes in Mathematics Series)

by Maria Giovanna Garroni Jose Luis Menaldi

The Green function has played a key role in the analytical approach that in recent years has led to important developments in the study of stochastic processes with jumps. In this Research Note, the authors-both regarded as leading experts in the field- collect several useful results derived from the construction of the Green function and its estim

Second-Order Variational Analysis in Optimization, Variational Stability, and Control: Theory, Algorithms, Applications (Springer Series in Operations Research and Financial Engineering)

by Boris S. Mordukhovich

This fundamental work is a sequel to monographs by the same author: Variational Analysis and Applications (2018) and the two Grundlehren volumes Variational Analysis and Generalized Differentiation: I Basic Theory, II Applications (2006). This present book is the first entirely devoted to second-order variational analysis with numerical algorithms and applications to practical models. It covers a wide range of topics including theoretical, numerical, and implementations that will interest researchers in analysis, applied mathematics, mathematical economics, engineering, and optimization. Inclusion of a variety of exercises and commentaries in each chapter allows the book to be used effectively in a course on this subject. This area has been well recognized as an important and rapidly developing area of nonlinear analysis and optimization with numerous applications. Consisting of 9 interrelated chapters, the book is self-contained with the inclusion of some preliminaries in Chapter 1.Results presented are useful tools for characterizations of fundamental notions of variational stability of solutions for diverse classes of problems in optimization and optimal control, the study of variational convexity of extended-real-valued functions and their specifications and variational sufficiency in optimization. Explicit calculations and important applications of second-order subdifferentials associated with the achieved characterizations of variational stability and related concepts, to the design and justification of second-order numerical algorithms for solving various classes of optimization problems, nonsmooth equations, and subgradient systems, are included. Generalized Newtonian algorithms are presented that show local and global convergence with linear, superlinear, and quadratic convergence rates. Algorithms are implemented to address interesting practical problems from the fields of machine learning, statistics, imaging, and other areas.

Secondary Instabilities of Görtler Vortices in High-Speed Boundary Layers

by Jie Ren

This thesis first reveals the mechanism of Görtler instabilities and then demonstrates how transitions at hypersonic flows can be effectively controlled (either promoted or suppressed) with Görtler or Klebanoff modes. It focuses on understanding and controlling flow transitions from mild laminar to fully turbulent flows at high speeds—aspects that have become crucial at the dawn of an incredible era, in which hypersonic vehicles are becoming available. Once this occurs, it will be possible to travel from Beijing to Los Angeles within just 2 hours, and we will all live in a genuinely global village—and not just virtually, but physically.Görtler instabilities have often been used to promote flow transition in hypersonic vehicles. However, how Görtler instabilities are excited and how they evolve in hypersonic flows are questions that have yet to be answered.

Secondary Maths in Action

by Emma McCrea

In Secondary Maths in Action, experienced curriculum expert and maths teacher Emma McCrea offers insights into the complex task of teaching maths.Taking an evidence-informed stance, Emma first explores the age-old question of why we study maths and the important role it plays in our lives and in society. Next she examines several pertinent debates in maths - those of pupil grouping, mastery and gender. Finally, we are taken on a grand tour of curriculum, pedagogy and assessment as the fundamental pillars of great teaching.Additionally, the book includes four rich case studies, revisited throughout the curriculum, pedagogy, and assessment chapters, which help to showcase how these ideas can be applied in various contexts - so you can really see what it all looks like In Action.

Secondary Maths in Action

by Emma McCrea

In Secondary Maths in Action, experienced curriculum expert and maths teacher Emma McCrea offers insights into the complex task of teaching maths.Taking an evidence-informed stance, Emma first explores the age-old question of why we study maths and the important role it plays in our lives and in society. Next she examines several pertinent debates in maths - those of pupil grouping, mastery and gender. Finally, we are taken on a grand tour of curriculum, pedagogy and assessment as the fundamental pillars of great teaching.Additionally, the book includes four rich case studies, revisited throughout the curriculum, pedagogy, and assessment chapters, which help to showcase how these ideas can be applied in various contexts - so you can really see what it all looks like In Action.

Secondary Stem Educational Reform

by Carla C. Johnson

Federal and state funding agencies have invested billions of dollars into secondary STEM (Science, Technology, Education, Mathematics) educational reform over the past decade. This volume addresses the interplay of external and internal variables associated with school reform and how this dynamic has impacted many efforts.

Secret History: The Story of Cryptology (Chapman & Hall/CRC Cryptography and Network Security Series #76)

by Craig Bauer

The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading. Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here. The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken. The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field. FEATURES Presents a chronological development of key concepts Includes the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers

Secret History: The Story of Cryptology (Discrete Mathematics and Its Applications)

by Craig P. Bauer

Winner of an Outstanding Academic Title Award from CHOICE MagazineMost available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the

Secrets of Creation: The Mystery Of The Prime Numbers (Urbanomic / Redactions)

by Robin Mackay Conrad Shawcross Matthew Watkins

An artist and a mathematician debate, find common ground, and jointly create an assemblage that is neither (or both) an artwork and a mathematical model.A week-long residency project brought together artist Conrad Shawcross and mathematician Matthew Watkins to reflect on the ways in which artists use (or misuse) scientific and mathematical concepts. Secrets of Creation documents this fascinating meeting of worlds, presenting both the week's discussions and debates, and the project upon which Shawcross and Watkins subsequently embarked.Navigating a route that tacked between formalism and natural language, experts and laymen, quantity and quality, poetics and mechanics, Shawcross and Watkins gradually forged a shared discourse in which the concerns of the artist and those of the mathematician could find a common ground. The project ended with their joint creation of an assemblage that was neither (or both) an artwork and a mathematical model.

Secrets of Mental Math: The Mathemagician's Guide to Lightning Calculation and Amazing Math Tricks

by Michael Shermer Arthur Benjamin

These simple math secrets and tricks will forever change how you look at the world of numbers. Secrets of Mental Math will have you thinking like a math genius in no time. Get ready to amaze your friends--and yourself--with incredible calculations you never thought you could master, as renowned "mathemagician" Arthur Benjamin shares his techniques for lightning-quick calculations and amazing number tricks. This book will teach you to do math in your head faster than you ever thought possible, dramatically improve your memory for numbers, and--maybe for the first time--make mathematics fun. <p><p> Yes, even you can learn to do seemingly complex equations in your head; all you need to learn are a few tricks. You'll be able to quickly multiply and divide triple digits, compute with fractions, and determine squares, cubes, and roots without blinking an eye. No matter what your age or current math ability, Secrets of Mental Math will allow you to perform fantastic feats of the mind effortlessly. This is the math they never taught you in school.<p><p> <i>Advisory: Bookshare has learned that this book offers only partial accessibility. We have kept it in the collection because it is useful for some of our members. To explore further access options with us, please contact us through the Book Quality link on the right sidebar. Benetech is actively working on projects to improve accessibility issues such as these.</i> <P> <b>There is another version of the book with mathematical expressions not rendered as images at https://www.bookshare.org/browse/book/446779</b>

Secrets of Mental Math: The Mathemagician's Guide to Lightning Calculation and Amazing Math Tricks, 1st Edition

by Michael Shermer Arthur Benjamin

Arthur Benjamin shares his techniques for lightning-quick calculations and amazing number tricks. This book will teach you to do math in your head faster than you ever thought possible, dramatically improve your memory for numbers, and--maybe for the first time--make mathematics fun.

Secrets of the Moon: Understanding and Analysing the Lunar Surface

by Gilbert Fielder

Secrets of the Moon: Understanding and Analysing the Lunar Surface provides a unique account of the origin of key features on the lunar surface. Containing historical accounts and the latest observations from the field, in addition to exciting data from the Apollo manned missions, it describes the development of our current understanding of our Moon. It also explores the fracturing of the Moon, a topic not explored in other literature in the area, and contains a statistical treatment of the smaller craters of the Moon, as well as a geological treatment of the larger craters. This moderately technical account is designed to clarify and update the general thinking on the nature and origin of the most important lunar surface features for both undergraduate and research students. It may also be read by the professional scientist, especially the astronomer and the geologist who has found little time to study the Moon’s topography, in addition to the lunar amateur astronomer and even the dedicated layman with a keen interest in lunar science. The book excludes nearly all mathematical symbols in order to remain accessible to those without a formal education in the area. Key Features: Authored by an expert in the area Presents a comprehensive account of the lunar surface, from historical observations to the NASA Apollo manned missions and the latest observations and data in the field Includes a statistical and geological treatment of the craters Dr. Gilbert Fielder is Reader Emeritus at Lancaster University, United Kingdom. He performed extended teaching at Lancaster University on Planetary Science and introduced a new degree course on Remote Sensing. Prior to this, he was Principal Investigator in NASA’s Heat Capacity Mapping Programme, while continuing to head the Lunar and Planetary Unit at Lancaster until retirement. Dr. Fielder has authored several books, and presented many BBC and ITA television news programmes, as well as popular programmes with Sir Patrick Moore (on the BBC’s "The Sky at Night") and, on the occasion of the first landing of astronauts on the Moon, with David Frost as Chairman in a special programme.

Secular Cycles

by Peter Turchin Sergey A. Nefedov

Many historical processes exhibit recurrent patterns of change. Century-long periods of population expansion come before long periods of stagnation and decline; the dynamics of prices mirror population oscillations; and states go through strong expansionist phases followed by periods of state failure, endemic sociopolitical instability, and territorial loss. Peter Turchin and Sergey Nefedov explore the dynamics and causal connections between such demographic, economic, and political variables in agrarian societies and offer detailed explanations for these long-term oscillations--what the authors call secular cycles. Secular Cycles elaborates and expands upon the demographic-structural theory first advanced by Jack Goldstone, which provides an explanation of long-term oscillations. This book tests that theory's specific and quantitative predictions by tracing the dynamics of population numbers, prices and real wages, elite numbers and incomes, state finances, and sociopolitical instability. Turchin and Nefedov study societies in England, France, and Russia during the medieval and early modern periods, and look back at the Roman Republic and Empire. Incorporating theoretical and quantitative history, the authors examine a specific model of historical change and, more generally, investigate the utility of the dynamical systems approach in historical applications. An indispensable and groundbreaking resource for a wide variety of social scientists, Secular Cycles will interest practitioners of economic history, historical sociology, complexity studies, and demography.

Secure Networked Inference with Unreliable Data Sources

by Aditya Vempaty Bhavya Kailkhura Pramod K. Varshney

The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.

Security Framework and Defense Mechanisms for IoT Reactive Jamming Attacks (Studies in Systems, Decision and Control #548)

by Alvaro Rocha Fadele Ayotunde Alaba

This book digs into the important confluence of cybersecurity and big data, providing insights into the ever-changing environment of cyber threats and solutions to protect these enormous databases. In the modern digital era, large amounts of data have evolved into the vital organs of businesses, providing the impetus for decision-making, creativity, and a competitive edge. Cyberattacks pose a persistent danger to this important resource since they can result in data breaches, financial losses, and harm to an organization's brand. Features of particular interest include: a. Understanding the Threat Landscape: The book gives a complete review of the many different types of cyber threats that target big data, including data breaches, ransomware attacks, and insider threats. b. Analysing Real-World Case Studies: The purpose of this section is to provide the reader with useful insights into the strategies, methods, and processes that cyber adversaries use via the in-depth examination of real-world assaults on big data. c. Strategies for Risk Mitigation: This book provides a comprehensive and actionable approach to reducing the dangers of cyberattacks on large amounts of data. It encompasses a broad variety of tactics, including network protection, encoding, and access restrictions d. Emerging Technologies: This section introduces readers to cutting-edge technologies and best practices for securing large data. e. Compliance with Regulations: The book examines the regulatory environment that governs data protection and privacy, including the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and industry-specific requirements. f. Trends of the Future: This book covers current trends and issues in cybersecurity and gives forward-looking views into the future of big data security. This is done in recognition that the cybersecurity environment is always shifting and developing. g. Contributors of Expertise: The book includes contributions from industry practitioners, data scientists, and cybersecurity specialists who have hands-on experience defending large data settings.

Security Management for Industrial Safety Critical Applications: A Practical Approach (Asset Analytics)

by Lalit Kumar Singh Pooja Singh Raj Kamal Kaur Ajit K. Verma

The book introduces dependability (security metric) ideas, gives a general overview of the security analysis of Safety-Critical Systems (SCSs), explains why the study is necessary and defines key terms relevant to this research. It makes an effort to emphasize the significance of security in comparison to other dependability indicators and illustrates the key drivers of this research's purpose. The mathematical foundation of the security analysis process is briefly illustrated, and key mathematical terminology and concepts are presented that are crucial for the security evaluation of critical systems. This book's objective is to provide a thorough understanding of the security analysis process. It will be a research-focused book designed for undergraduate, graduate, and doctoral courses in software and cyber security. The fundamentals of reliability, security, metrics, and mathematical foundation have been covered in this book. Each technique's actual applications, along with benefits and drawbacks, are also shown. Applying each technique to the various case studies serves as a demonstration of how it works. By using the many case studies of safety-critical systems, the students can also learn different analysis approaches and how to model them. Students will be able to use these tools, in particular, on a case study of their choice to analyze system security. The book includes a comparison of various strategies and appropriate recommendations for further reading on these subjects. Moreover, this book's target audience includes software professionals who are interested in security analysis.

Security Risk Models for Cyber Insurance

by David Rios Insua Caroline Baylon Jose Vila

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude—and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution – based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts – but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

Security and Environmental Sustainability of Multimodal Transport

by Michael Bell Solmaz Haji Hosseinloo Urszula Kanturska

This book is the result of a NATO Advanced Research Workshop which was held at Imperial College London in January 2009. It features contributions from a range of international experts covering topics related to the transport of hazardous materials, such as routeing and scheduling, risk assessment, security, and social and environmental exposure. There is also a broad look at the implications of climate change for transport. This unique resource offers a deep understanding of hazardous material transportation and concomitant security and environmental problems. The risks involved in the transport of dangerous goods are shown to arise mainly from the location of the sources and destinations as well as the timing of deliveries. Environmental concerns, including the implications of climate change for transport, provide a useful context for the more analytical material. The book is timely and topical as the subjects covered have become a focus for public concern in recent years, due in part to terrorist attacks on transport systems. This comprehensive reference provides examples from around the world, illustrating the diversity of regulations which apply to the handling and transport of dangerous goods. It also provides interesting insights into the global energy supply chain and describes on-going work on establishing network vulnerability.

Security and Privacy in Cyberspace (Blockchain Technologies)

by Manoj Kumar Omprakash Kaiwartya Ashutosh Mishra Keshav Kaushik Sachin Kumar Gupta

This book highlights the literature and the practical aspects to understand cybersecurity and privacy in various networks and communication devices. It provides details of emerging technologies on various networks by protecting the privacy and security of cyberspace. This book presents state-of-the-art advances in the field of cryptography and network security, cybersecurity and privacy, providing a good reference for professionals and researchers.

Security and Trust Management: 20th International Workshop, STM 2024, Bydgoszcz, Poland, September 19–20, 2024, Proceedings (Lecture Notes in Computer Science #15235)

by Fabio Martinelli Ruben Rios

This book constitutes the refereed proceedings of the 20th International Workshop on Security and Trust Management (ERCIM STM 2024), held in Bydgoszcz, Poland, during September 19–20, 2024 and co-located with ESORICS 2024 conference. The 6 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 22 submissions. They were organized in topical sections as follows: Trust, Anonymity and Identity; Cryptography, Secure Computation and Formal Methods; Operating Systems and Application Security.

Security for Software Engineers

by James N. Helfrich

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored from a theoretical and a practical-application standpoint. Features: <P><P> Targets software engineering students - one of the only security texts to target this audience. <P><P> Focuses on the white-hat side of the security equation rather than the black-hat side. <P><P> Includes many practical and real-world examples that easily translate into the workplace. <P><P> Covers a one-semester undergraduate course. <P><P> Describes all aspects of computer security as it pertains to the job of a software engineer and presents problems similar to that which an engineer will encounter in the industry. <P><P> This text will equip students to make knowledgeable security decisions, be productive members of a security review team, and write code that protects a user’s information assets.

Sedentary Behaviour Epidemiology (Springer Series on Epidemiology and Public Health)

by Michael F. Leitzmann Carmen Jochem Daniela Schmid

This book addresses the origins, determinants and magnitude of the global problem of sedentary behaviour, along with concise yet in-depth solutions for tackling it. As a consequence of major technological advances in modern society, many people find themselves in environments characterized by prolonged sedentary behaviour. Building on the contributions of leading experts in the field, the new edition of this book presents updated knowledge about sedentary behaviour, its medical and public health significance, its correlates and determinants, measurement techniques, and recommendations for addressing this behaviour at the individual, community, environmental, and policy level. The book encompasses current research linking the COVID-19 pandemic to increased levels of sedentary behavior, and it covers global and planetary health aspects of sedentary behavior, highlighting sustainable development goals such as health and well-being for all. Applying a cross-disciplinary methodology, the book avoids considering physical activity and sedentary behavior as a single continuum, which potentially hampers progress in confronting widespread levels of sedentariness. Rather, the book helps readers better understand how sedentary and physically active behavior co-occur and how the two behaviours have distinct contributing factors. Building on the contributions of distinguished international experts in the field, this thorough resource is a valuable asset and challenges professionals, researchers, students, and practitioners alike to adopt new strategies and expand their reach.

Refine Search

Showing 22,826 through 22,850 of 28,747 results