Browse Results

Showing 27,251 through 27,275 of 61,912 results

A Future for Public Service Television (Goldsmiths Press Ser.)

by Vana Goblot Edited by Des Freedman

A guide to the nature, purpose, and place of public service television within a multi-platform, multichannel ecology.Television is on the verge of both decline and rebirth. Vast technological change has brought about financial uncertainty as well as new creative possibilities for producers, distributors, and viewers. This volume from Goldsmiths Press examines not only the unexpected resilience of TV as cultural pastime and aesthetic practice but also the prospects for public service television in a digital, multichannel ecology. The proliferation of platforms from Amazon and Netflix to YouTube and the vlogosphere means intense competition for audiences traditionally dominated by legacy broadcasters. Public service broadcasters—whether the BBC, the German ARD, or the Canadian Broadcasting Corporation—are particularly vulnerable to this volatility. Born in the more stable political and cultural conditions of the twentieth century, they face a range of pressures on their revenue, their remits, and indeed their very futures. This book reflects on the issues raised in Lord Puttnam's 2016 Public Service TV Inquiry Report, with contributions from leading broadcasters, academics, and regulators. With resonance for students, professionals, and consumers with a stake in British media, it serves both as historical record and as a look at the future of television in an on-demand age.Contributors includeTess Alps, Patrick Barwise, James Bennett, Georgie Born, Natasha Cox, Gunn Enli, Des Freedman, Vana Goblot, David Hendy, Jennifer Holt, Amanda D. Lotz, Sarita Malik, Matthew Powers, Lord Puttnam, Trine Syvertsen, Jon Thoday, Mark Thompson

A Geometric Algebra Invitation to Space-Time Physics, Robotics and Molecular Geometry (SpringerBriefs in Mathematics)

by Carlile Lavor Sebastià Xambó-Descamps Isiah Zaplana

This book offers a gentle introduction to key elements of Geometric Algebra, along with their applications in Physics, Robotics and Molecular Geometry. Major applications covered are the physics of space-time, including Maxwell electromagnetism and the Dirac equation; robotics, including formulations for the forward and inverse kinematics and an overview of the singularity problem for serial robots; and molecular geometry, with 3D-protein structure calculations using NMR data. The book is primarily intended for graduate students and advanced undergraduates in related fields, but can also benefit professionals in search of a pedagogical presentation of these subjects.

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology

by Sara Baase Timothy M. Henry

For courses in Computer Ethics and Computers and Society. An objective study of technology ethics that inspires critical thinking and debate, <p><p> In Gift of Fire, A: Social, Legal, and Ethical Issues for Computing Technology, Sara Baase presents a balanced exploration of the social, legal, philosophical, ethical, political, constitutional, and economic implications of computing and the controversies they raise. With an objective computer scientist's perspective, and with historical context for many issues, Baase covers the issues readers will face both as members of a technological society and as professionals in computer-related fields. A primary goal is to develop computer professionals who understand the implications of what they create and how it fits into society at large. This text encourages readers to think about the ethics and philosophical direction behind topics but doesn't lead students to conclusions. <p><p>The 5th Edition contains updated material on new topics and examples, outdated material has been removed, and several topics have been reorganized. New material appears throughout, including material on current trending topics such as drones and autonomous cars.

A History of Cyber Security Attacks: 1980 to Present

by Bruce Middleton

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a lessons learned and recommendations section.

A Holistic Approach to Lessons Learned: How Organizations Can Benefit from Their Own Knowledge

by Moria Levy

The book presents a holistic approach to organization performance improvements by lessons learned management. Such an approach is required because specific methods, such as debriefing, task management or procedures updates, do not achieve actual improvements. The presented model spans the entire life cycle of lessons learned: Starting from creating new lessons, moving on to knowledge refining and ending with smart integration into the organizational environment so future re-use of knowledge is enabled. The model also addresses other sources of organizational learning including quality processes and employee experience utilization.

A Hybrid Approach for Power Plant Fault Diagnostics (Studies in Computational Intelligence #743)

by Tamiru Alemu Lemma

This book provides a hybrid approach to fault detection and diagnostics. It presents a detailed analysis related to practical applications of the fault detection and diagnostics framework, and highlights recent findings on power plant nonlinear model identification and fault diagnostics. The effectiveness of the methods presented is tested using data acquired from actual cogeneration and cooling plants (CCPs). The models presented were developed by applying Neuro-Fuzzy (NF) methods. The book offers a valuable resource for researchers and practicing engineers alike.

A Lexical Semantic Study of Chinese Opposites (Frontiers in Chinese Linguistics #1)

by Jing Ding

This book studies Chinese opposites. It uses a large corpus (GigaWord) to trace the behavior of opposite pairings' co-occurrence, focusing on the following questions: In what types of constructions, from window-size restricted and bi-syllabic to quad-syllabic, will the opposite pairings appear together? And, on a larger scale, i. e. in constrained-free contexts, in which syntactic frames will the opposite pairings appear together? The data suggests aspects that have been ignored by previous theoretical studies, such as the ordering rules in co-occurrent pairings, the differences between the three main sub-types of opposites (that is, antonym, complementary, converse) in discourse function distributions. The author also considers the features of this Chinese study and compares it to similar studies of English and Japanese. In all, it offers a practical view of how opposites are used in a certain language as a response to the puzzles lingering in theoretical fields. This study appeals to linguists, computational linguists and language-lovers. With numerous tables, illustrations and examples, it is easy to read but also encourages readers to link their personal instincts with the results from a large corpus to experience the beauty of language as a shared human resource.

A Metaheuristic Approach to Protein Structure Prediction: Algorithms And Insights From Fitness Landscape Analysis (Emergence, Complexity And Computation Ser. #31)

by Swagatam Das Nanda Dulal Jana Jaya Sil

This book introduces characteristic features of the protein structure prediction (PSP) problem. It focuses on systematic selection and improvement of the most appropriate metaheuristic algorithm to solve the problem based on a fitness landscape analysis, rather than on the nature of the problem, which was the focus of methodologies in the past. Protein structure prediction is concerned with the question of how to determine the three-dimensional structure of a protein from its primary sequence. Recently a number of successful metaheuristic algorithms have been developed to determine the native structure, which plays an important role in medicine, drug design, and disease prediction. This interdisciplinary book consolidates the concepts most relevant to protein structure prediction (PSP) through global non-convex optimization. It is intended for graduate students from fields such as computer science, engineering, bioinformatics and as a reference for researchers and practitioners.

A New Kind of Computational Biology: Cellular Automata Based Models for Genomics and Proteomics

by Parimal Pal Chaudhuri Soumyabrata Ghosh Adip Dutta Somshubhro Pal Choudhury

This book reflects more than three decades of research on Cellular Automata (CA), and nearly a decade of work on the application of CA to model biological strings, which forms the foundation of 'A New Kind of Computational Biology' pioneered by the start-up, CARLBio. After a brief introduction on Cellular Automata (CA) theory and functional biology, it reports on the modeling of basic biological strings with CA, starting with the basic nucleotides leading to codon and anti-codon CA models. It derives a more involved CA model of DNA, RNA, the entire translation process for amino acid formation and the evolution of protein to its unique structure and function. In subsequent chapters the interaction of Proteins with other bio-molecules is also modeled. The only prior knowledge assumed necessary is an undergraduate knowledge of computer programming and biology. The book adopts a hands-on, “do-it-yourself” approach to enable readers to apply the method provided to derive the CA rules and comprehend how these are related to the physical ‘rules’ observed in biology. In a single framework, the authors have presented two branches of science – Computation and Biology. Instead of rigorous molecular dynamics modeling, which the authors describe as a Bottoms-Up model, or relying on the Top-Down new age Artificial Intelligence (AI) and Machine Language (ML) that depends on extensive availability of quality data, this book takes the best from both the Top-Down and Bottoms-up approaches and establishes how the behavior of complex molecules is represented in CA. The CA rules are derived from the basic knowledge of molecular interaction and construction observed in biological world but mapped to a few subset of known results to derive and predict results.This book is useful for students, researchers and industry practitioners who want to explore modeling and simulation of the physical world complex systems from a different perspective. It raises the inevitable the question – ‘Are life and the universe nothing but a collection of continuous systems processing information’.

A New Platform for Edge Mode Manipulations in the Quantum Hall Effect (Springer Theses)

by Yonatan Cohen

In the last several decades, the quantum Hall effect has provided a remarkable platform for manipulating one-dimensional electronic modes and investigating fundamental physical phenomena. However, certain limitations make it difficult for various kinds of interesting modes structures to be formed using this platform. One example is the so called helical mode structure, in which two one-dimensional, counter propagating modes have opposite spins and thus spin and momentum are locked. Such helical modes have lately attracted significant interest, since, when coupled to a conventional superconductor, they are expected to manifest topological superconductivity and host Majorana zero modes. Even more interesting are fractional helical modes, which open the way for realizing generalized parafermionic zero modes. Possessing non-abelian exchange statistics, these quasiparticles may serve as building blocks in topological quantum computing. Here we present a new platform for manipulating integer and fractional quantum Hall edge modes, which allows the formation of robust one-dimensional helical as well as fractional helical modes. The platform is based on a carefully designed double-quantum-well structure in a GaAs based system hosting two electronic sub-bands in the quantum Hall effect regime. By electrostatic gating of different areas of the structure, counter-propagating integer, as well as fractional, edge modes with opposite spins are formed and their spin protection is verified. Beyond the formation of helical modes, the new platform can serve as a rich playground for new research. Some new possibilities include the artificial induction of compounded fractional edge modes and the construction of new edge mode-based interferometers.

A Paraconsistent Decision-Making Method (Smart Innovation, Systems and Technologies #87)

by Jair Minoro Abe Fábio Romeu Carvalho

This book presents a novel decision-making support system based on paraconsistent annotated evidential logic, which directly handles imprecise, incomplete and contradictory data. The authors offer insights into areas such as engineering and biomedicine, as well as related fields. Decision analysis is useful in making choices when the consequences of actions are uncertain, like in business administration, where it assists in making investment decisions, and in health care, Decision analysis is also valuable when the possible actions may lead to conflicting consequences. A fundamental tenet of decision analysis is that even though the available information is incomplete, a decision must be made. Thus, analyses often contain assumptions about or estimates of missing data.The contribution that this method can provide to professionals and companies has significant relevance in terms of the impact of information systems on productivity and quality of the companies; the lack of training companies for proper planning and management of information systems; and the need for interdisciplinary treatment of several sectors of almost all related scientific areas.This book is a valuable resource for professionals seeking a competitive edge in their performance.

A People’s History of Computing in the United States

by Joy Lisi Rankin

Does Silicon Valley deserve all the credit for digital creativity and social media? Joy Rankin questions this triumphalism by revisiting a pre-PC time when schools were not the last stop for mature consumer technologies but flourishing sites of innovative collaboration—when users taught computers and visionaries dreamed of networked access for all.

A Play of Bodies: How We Perceive Videogames (The\mit Press Ser.)

by Brendan Keogh

An investigation of the embodied engagement between the playing body and the videogame: how player and game incorporate each other.Our bodies engage with videogames in complex and fascinating ways. Through an entanglement of eyes-on-screens, ears-at-speakers, and muscles-against-interfaces, we experience games with our senses. But, as Brendan Keogh argues in A Play of Bodies, this corporal engagement goes both ways; as we touch the videogame, it touches back, augmenting the very senses with which we perceive. Keogh investigates this merging of actual and virtual bodies and worlds, asking how our embodied sense of perception constitutes, and becomes constituted by, the phenomenon of videogame play. In short, how do we perceive videogames?Keogh works toward formulating a phenomenology of videogame experience, focusing on what happens in the embodied engagement between the playing body and the videogame, and anchoring his analysis in an eclectic series of games that range from mainstream to niche titles. Considering smartphone videogames, he proposes a notion of co-attentiveness to understand how players can feel present in a virtual world without forgetting that they are touching a screen in the actual world. He discusses the somatic basis of videogame play, whether games involve vigorous physical movement or quietly sitting on a couch with a controller; the sometimes overlooked visual and audible pleasures of videogame experience; and modes of temporality represented by character death, failure, and repetition. Finally, he considers two metaphorical characters: the “hacker,” representing the hegemonic, masculine gamers concerned with control and configuration; and the “cyborg,” less concerned with control than with embodiment and incorporation.

A Practical Guide to Database Design (Second Edition)

by Rex Hogan

Fully updated and expanded from the previous edition, A Practical Guide to Database Design, Second Edition, is intended for those involved in the design or development of a database system or application. It begins by focusing on how to create a logical data model where data is stored "where it belongs." Next, data usage is reviewed to transform the logical model into a physical data model that will satisfy user performance requirements. Finally, it describes how to use various software tools to create user interfaces to review and update data in a database. Organized into 11 chapters, the book begins with an overview of the functionality of database management systems and how they guarantee the accuracy and availability of data. It then describes how to define and normalize data requirements to create a logical data model, then map them into an initial solution for a physical database. The book next presents how to use an industry-leading data modeling tool to define and manage logical and physical data models. After that, it describes how to implement a physical database using either Microsoft Access or SQL Server and how to use Microsoft Access to create windows interfaces to query or update data in tables. The last part of the book reviews software tools and explores the design and implementation of a database using as an example a much more complex data environment for a University. The book ends with a description of how to use PHP to build a web-based interface to review and update data in a database.

A Quadratic Constraint Approach to Model Predictive Control of Interconnected Systems (Studies In Systems, Decision And Control #148)

by Anthony Tri Tran C. Quang Ha

This book focuses on the stabilization and model predictive control of interconnected systems with mixed connection configurations. It introduces the concept of dissipation-based quadratic constraint for developing attractivity assurance methods for interconnected systems. In order to develop these methods, distributed and decentralized architectures are employed, whereby the communication between subsystems is fully connected, partially connected, or completely disconnected. Given that the control inputs are entirely or partially decoupled between subsystems and no additional constraints are imposed on the interactive variables beyond the coupling constraint itself, the proposed approaches can be used with various types of systems and applications. Further, the book describes how the effects of coupling delays and data losses in device networks are resolved. From a practical perspective, the innovations presented are of benefit in applications in a broad range of fields, including the process and manufacturing industries, networked robotics, and network-centric systems such as chemical process systems, power systems, telecommunication networks, transportation networks, and, no less importantly, supply chain automation.

A Semidiscrete Version of the Citti-Petitot-Sarti Model as a Plausible Model for Anthropomorphic Image Reconstruction and Pattern Recognition (SpringerBriefs in Mathematics)

by Jean-Paul Gauthier Dario Prandi

This book proposes a semi-discrete version of the theory of Petitot and Citti-Sarti, leading to a left-invariant structure over the group SE(2,N), restricted to a finite number of rotations. This apparently very simple group is in fact quite atypical: it is maximally almost periodic, which leads to much simpler harmonic analysis compared to SE(2). Based upon this semi-discrete model, the authors improve on previous image-reconstruction algorithms and develop a pattern-recognition theory that also leads to very efficient algorithms in practice.

A Socio-Legal Study of Hacking: Breaking and Remaking Law and Technology (Law, Science and Society)

by Michael Anthony Dizon

The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.

A Step by Step Approach to the Modeling of Chemical Engineering Processes

by Liliane Maria Ferrareso Lona

This book treats modeling and simulation in a simple way, that builds on the existing knowledge and intuition of students. They will learn how to build a model and solve it using Excel.Most chemical engineering students feel a shiver down the spine when they see a set of complex mathematical equations generated from the modeling of a chemical engineering system. This is because they usually do not understand how to achieve this mathematical model, or they do not know how to solve the equations system without spending a lot of time and effort.Trying to understand how to generate a set of mathematical equations to represent a physical system (to model) and solve these equations (to simulate) is not a simple task. A model, most of the time, takes into account all phenomena studied during a Chemical Engineering course. In the same way, there is a multitude of numerical methods that can be used to solve the same set of equations generated from the modeling, and many different computational languages can be adopted to implement the numerical methods. As a consequence of this comprehensiveness and combinatorial explosion of possibilities, most books that deal with this subject are very extensive and embracing, making need for a lot of time and effort to go through this subject. It is expected that with this book the chemical engineering student and the future chemical engineer feel motivated to solve different practical problems involving chemical processes, knowing they can do that in an easy and fast way, with no need of expensive software.

A Survey of Fractal Dimensions of Networks (SpringerBriefs in Computer Science)

by Eric Rosenberg

Many different fractal dimensions have been proposed for networks. In A Survey of Fractal Dimensions of Networks the theory and computation of the most important of these dimensions are reviewed, including the box counting dimension, the correlation dimension, the mass dimension, the transfinite fractal dimension, the information dimension, the generalized dimensions (which provide a way to describe multifractals), and the sandbox method (for approximating the generalized dimensions). The book describes the use of diameter-based and radius-based boxes, and presents several heuristic methods for box counting, including greedy coloring, random sequential node burning, and a method for computing a lower bound. We also discuss very recent results on resolving ambiguity in the calculation of the information dimension and the generalized dimensions, and on the non-monotonicity of the generalized dimensions. Anyone interested in the theory and application of networks will want to read this Brief. This includes anyone studying, e.g., social networks, telecommunications networks, transportation networks, ecological networks, food chain networks, network models of the brain, or financial networks.

A Survey on 3D Cameras: Metrological Comparison of Time-of-Flight, Structured-Light and Active Stereoscopy Technologies (SpringerBriefs in Computer Science)

by Silvio Giancola Matteo Valenti Remo Sala

This book is a valuable resource to deeply understand the technology used in 3D cameras. In this book, the authors summarize and compare the specifications of the main 3D cameras available in the mass market. The authors present a deep metrological analysis of the main camera based on the three main technologies: Time-of-Flight, Structured-Light and Active Stereoscopy, and provide qualitative results for any user to understand the underlying technology within 3D camera, as well as practical guidance on how to get the most of them for a given application.

A Survey on Coordinated Power Management in Multi-Tenant Data Centers

by Thant Zin Oo Nguyen H. Tran Shaolei Ren Choong Seon Hong

This book investigates the coordinated power management of multi-tenant data centers that account for a large portion of the data center industry. The authors include discussion of their quick growth and their electricity consumption, which has huge economic and environmental impacts. This book covers the various coordinated management solutions in the existing literature focusing on efficiency, sustainability, and demand response aspects. First, the authors provide a background on the multi-tenant data center covering the stake holders, components, power infrastructure, and energy usage. Then, each power management mechanism is described in terms of motivation, problem formulation, challenges and solution.

A Systematic Approach to Learning Robot Programming with ROS

by Wyatt Newman

<p>A Systematic Approach to Learning Robot Programming with ROS provides a comprehensive, introduction to the essential components of ROS through detailed explanations of simple code examples along with the corresponding theory of operation. The book explores the organization of ROS, how to understand ROS packages, how to use ROS tools, how to incorporate existing ROS packages into new applications, and how to develop new packages for robotics and automation. It also facilitates continuing education by preparing the reader to better understand the existing on-line documentation. <p>The book is organized into six parts. It begins with an introduction to ROS foundations, including writing ROS nodes and ROS tools. Messages, Classes, and Servers are also covered. The second part of the book features simulation and visualization with ROS, including coordinate transforms. <p>The next part of the book discusses perceptual processing in ROS. It includes coverage of using cameras in ROS, depth imaging and point clouds, and point cloud processing. Mobile robot control and navigation in ROS is featured in the fourth part of the book <p>The fifth section of the book contains coverage of robot arms in ROS. This section explores robot arm kinematics, arm motion planning, arm control with the Baxter Simulator, and an object-grabber package. The last part of the book focuses on system integration and higher-level control, including perception-based and mobile manipulation. <p>This accessible text includes examples throughout and C++ code examples are also provided at https://github.com/wsnewman/learning_ros</p>

A Telepsychology Casebook: Using Technology Ethically and Effectively in Your Professional Practice

by Linda F. Campbell

This casebook provides practical recommendations on a range of issues associated with electronic-based mental health care. <p><p>From technologies as simple as the telephone to more advanced webcams and mobile device applications, psychologists are increasingly using technology in their work—a practice known as telepsychology. Telepsychology allows clinicians to conduct remote therapy sessions, supplement in-person sessions with resources and follow-up care, collect and store client data, and more. <p><p>The book's recommendations draw from the Guidelines for the Practice of Telepsychology, which were created jointly by APA, the Association of State and Provincial Psychology Boards, and the American Insurance Trust. Each chapter presents a guideline, explains how it relates to professional ethics and standards of care, and applies it to case examples. The richly nuanced case examples depict a broad range of dilemmas that psychologists may encounter when conducing telepsychology, as well as a broad range of settings, including hospitals, community health centers, private practice, industrial/organizational settings, forensic settings, academia, military, and veterans' centers. Whatever setting you practice in, you will find guidance for applying technology effectively, legally, and ethically.

A World of Fiction: Digital Collections and the Future of Literary History (Digital Humanities)

by Katherine Bode

During the 19th century, throughout the Anglophone world, most fiction was first published in periodicals. In Australia, newspapers were not only the main source of periodical fiction, but the main source of fiction in general. Because of their importance as fiction publishers, and because they provided Australian readers with access to stories from around the world—from Britain, America and Australia, as well as Austria, Canada, France, Germany, New Zealand, Russia, South Africa, and beyond—Australian newspapers represent an important record of the transnational circulation and reception of fiction in this period. Investigating almost 10,000 works of fiction in the world’s largest collection of mass-digitized historical newspapers (the National Library of Australia’s Trove database), A World of Fiction reconceptualizes how fiction traveled globally, and was received and understood locally, in the 19th century. Katherine Bode’s innovative approach to the new digital collections that are transforming research in the humanities are a model of how digital tools can transform how we understand digital collections and interpret literatures in the past.

AI 2018: 31st Australasian Joint Conference, Wellington, New Zealand, December 11-14, 2018, Proceedings (Lecture Notes in Computer Science #11320)

by Xiaodong Li Tanja Mitrovic Bing Xue

This book constitutes the proceedings of the 31st Australasian Joint Conference on Artificial Intelligence, AI 2018, held in Wellington, New Zealand, in December 2018. The 50 full and 26 short papers presented in this volume were carefully reviewed and selected from 125 submissions. The paper were organized in topical sections named: agents, games and robotics; AI applications and innovations; computer vision; constraints and search; evolutionary computation; knowledge representation and reasoning; machine learning and data mining; planning and scheduling; and text mining and NLP.

Refine Search

Showing 27,251 through 27,275 of 61,912 results