Browse Results

Showing 34,601 through 34,625 of 53,455 results

Playful User Interfaces: Interfaces that Invite Social and Physical Interaction (Gaming Media and Social Effects)

by Anton Nijholt

The book is about user interfaces to applications that have been designed for social and physical interaction. The interfaces are ‘playful’, that is, users feel challenged to engage in social and physical interaction because that will be fun. The topics that will be present in this book are interactive playgrounds, urban games using mobiles, sensor-equipped environments for playing, child-computer interaction, tangible game interfaces, interactive tabletop technology and applications, full-body interaction, exertion games, persuasion, engagement, evaluation and user experience. Readers of the book will not only get a survey of state-of-the-art research in these areas, but the chapters in this book will also provide a vision of the future where playful interfaces will be ubiquitous, that is, present and integrated in home, office, recreational, sports and urban environments, emphasizing that in the future in these environments game elements will be integrated and welcomed.

Brain-Computer Interfaces: Applying our Minds to Human-Computer Interaction (Human–Computer Interaction Series)

by Anton Nijholt Desney S. Tan

For generations, humans have fantasized about the ability to create devices that can see into a person's mind and thoughts, or to communicate and interact with machines through thought alone. Such ideas have long captured the imagination of humankind in the form of ancient myths and modern science fiction stories. Recent advances in cognitive neuroscience and brain imaging technologies have started to turn these myths into a reality, and are providing us with the ability to interface directly with the human brain. This ability is made possible through the use of sensors that monitor physical processes within the brain which correspond with certain forms of thought. Brain-Computer Interfaces: Applying our Minds to Human-Computer Interaction broadly surveys research in the Brain-Computer Interface domain. More specifically, each chapter articulates some of the challenges and opportunities for using brain sensing in Human-Computer Interaction work, as well as applying Human-Computer Interaction solutions to brain sensing work. For researchers with little or no expertise in neuroscience or brain sensing, the book provides background information to equip them to not only appreciate the state-of-the-art, but also ideally to engage in novel research. For expert Brain-Computer Interface researchers, the book introduces ideas that can help in the quest to interpret intentional brain control and develop the ultimate input device. It challenges researchers to further explore passive brain sensing to evaluate interfaces and feed into adaptive computing systems. Most importantly, the book will connect multiple communities allowing research to leverage their work and expertise and blaze into the future.

Predictive Analytics in Human Resource Management: A Hands-on Approach

by Shivinder Nijjer Sahil Raj

This volume is a step-by-step guide to implementing predictive data analytics in human resource management (HRM). It demonstrates how to apply and predict various HR outcomes which have an organisational impact, to aid in strategising and better decision-making. The book: Presents key concepts and expands on the need and role of HR analytics in business management. Utilises popular analytical tools like artificial neural networks (ANNs) and K-nearest neighbour (KNN) to provide practical demonstrations through R scripts for predicting turnover and applicant screening. Discusses real-world corporate examples and employee data collected first-hand by the authors. Includes individual chapter exercises and case studies for students and teachers. Comprehensive and accessible, this guide will be useful for students, teachers, and researchers of data analytics, Big Data, human resource management, statistics, and economics. It will also be of interest to readers interested in learning more about statistics or programming.

Magnonic Devices: Numerical Modelling and Micromagnetic Simulation Approach (SpringerBriefs in Materials)

by C. S. Nikhil Kumar

This book briefly looks at numerical modeling and micromagnetic simulation results of magnonic crystals, which are periodically modulated magnonic devices regarded as the magnetic counterpart of photonic crystals with spin waves acting as the information carrier. Since the wavelength of the spin wave is several orders of magnitude shorter than that of electromagnetic waves of the same frequency, magnonic crystals are promising candidates for miniaturization, especially in the fields of data storage and processing. The book begins by describing the dispersion relation of dipolar spin waves in a magnonic curved waveguide, solving Walker's equation in cylindrical coordinates, and then calculating the dispersion of exchange spin waves using perturbation theory. It describes simulated nano-contact-driven spin wave excitations in a magnonic cavity, featuring a design of an antidot magnonic crystal around the nano-contact, with the frequency of the spin wave mode generated lying within the band gap of the magnonic crystal. The proposed device behaves as a SWASER—Spin Wave Amplification by the Stimulated Emission of Radiation. This book will find interest among researchers and practitioners interested in the modeling, simulation, and design of novel magnonic devices.

Web and Internet Economics: 13th International Conference, WINE 2017, Bangalore, India, December 17–20, 2017, Proceedings (Lecture Notes in Computer Science #10660)

by Nikhil R. Devanur and Pinyan Lu

This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Web and Internet Economics, WINE 2017, held in Bangalore, India, in December 2017. The 28 full and 6 short papers presented were carefully reviewed and selected from 89 submissions. The papers reflect the work of researchers in theoretical computer science, artificial intelligence, and microeconomics who have joined forces to tackle problems at the intersection of computation, game theory and economics.

Create Stunning Renders Using V-Ray in 3ds Max: Guiding the Next Generation of 3D Renderers

by Margarita Nikita

Create Stunning Renders using V-Ray in 3ds Max: Guiding the Next Generation of 3D Renderers is a step-by-step guide on how to create realistic renderings using V-Ray in 3ds Max. The potentials of V-Ray are detailed using a bedroom scene as an example. The book introduces the 3ds Max interface and the basic commands, allowing readers to familiarize themselves with the work environment from the very beginning. This book is intended for architects, interior designers, and anyone else wanting to create photorealistic renderings using V-Ray in 3ds Max. The reader does not need experience to follow this book, but any prior knowledge of working in 3ds Max will help the reader jump right in. Margarita Nikita is the co-founder of High Q Renders LLC, an award-winning creative company based in San Francisco, CA, with offices in Greece. Nikita has published several design books on 2D and 3D graphic design, some of which are used in university courses, actively contributing to the formation of the new generation of 3D modelers in her native country, Greece. She shares her knowledge, advice, and tips and tricks on her YouTube channel, Margarita Nikita. More of her work is available at her Instagram account, @margarita.nikita.

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

by Bruce Nikkel

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.You’ll learn how to:–Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies–Protect attached evidence media from accidental modification–Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal–Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping–Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt–Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others–Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged mediaWith its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.

Practical Linux Forensics: A Guide for Digital Investigators

by Bruce Nikkel

A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack.Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You&’ll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used.Learn how to: • Extract evidence from storage devices and analyze partition tables, volume managers, popular Linux filesystems (Ext4, Btrfs, and Xfs), and encryption • Investigate evidence from Linux logs, including traditional syslog, the systemd journal, kernel and audit logs, and logs from daemons and applications • Reconstruct the Linux startup process, from boot loaders (UEFI and Grub) and kernel initialization, to systemd unit files and targets leading up to a graphical login • Perform analysis of power, temperature, and the physical environment of a Linux machine, and find evidence of sleep, hibernation, shutdowns, reboots, and crashes • Examine installed software, including distro installers, package formats, and package management systems from Debian, Fedora, SUSE, Arch, and other distros • Perform analysis of time and Locale settings, internationalization including language and keyboard settings, and geolocation on a Linux system • Reconstruct user login sessions (shell, X11 and Wayland), desktops (Gnome, KDE, and others) and analyze keyrings, wallets, trash cans, clipboards, thumbnails, recent files and other desktop artifacts • Analyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts (Wi-Fi, Bluetooth, WWAN), VPNs (including WireGuard), firewalls, and proxy settings • Identify traces of attached peripheral devices (PCI, USB, Thunderbolt, Bluetooth) including external storage, cameras, and mobiles, and reconstruct printing and scanning activity

From Complex Sentences to a Formal Semantic Representation using Syntactic Text Simplification and Open Information Extraction

by Christina Niklaus

This work presents a discourse-aware Text Simplification approach that splits and rephrases complex English sentences within the semantic context in which they occur. Based on a linguistically grounded transformation stage, complex sentences are transformed into shorter utterances with a simple canonical structure that can be easily analyzed by downstream applications. To avoid breaking down the input into a disjointed sequence of statements that is difficult to interpret, the author incorporates the semantic context between the split propositions in the form of hierarchical structures and semantic relationships, thus generating a novel representation of complex assertions that puts a semantic layer on top of the simplified sentences. In a second step, she leverages the semantic hierarchy of minimal propositions to improve the performance of Open IE frameworks. She shows that such systems benefit in two dimensions. First, the canonical structure of the simplified sentences facilitates the extraction of relational tuples, leading to an improved precision and recall of the extracted relations. Second, the semantic hierarchy can be leveraged to enrich the output of existing Open IE approaches with additional meta-information, resulting in a novel lightweight semantic representation for complex text data in the form of normalized and context-preserving relational tuples.

The Impact of Service Oriented Architecture Adoption on Organizations (SpringerBriefs in Electrical and Computer Engineering)

by Naghmeh Niknejad Ab Razak Hussin Iraj Sadegh Amiri

This book describes Service-Oriented Architecture (SOA) and the significant factors which affect its adoption, such as governance, strategy, complexity, Return on Investment (ROI), business and IT alignment, culture and communication, costs, and security. The study on which this book is based, involved a quantitative analysis to investigate the influential factors for adopting SOA, paving the way to further research in the field.

Quality Management in Reverse Logistics

by Yiannis Nikolaidis

Quality Management in Reverse Logistics intends to develop, collect, examine and evaluate a number of quality management (QM) tools and techniques, which can be applied in practice in order to understand, review and improve any closed-loop supply chain process. In other words, the book aims to examine the existing relationship between various well-developed and thoroughly studied quality issues, such as QM, quality assurance, standardization of processes and statistical quality control and the emerging research area of reverse logistics. Quality Management in Reverse Logistics contains modeling and quantitative methods that could be used by practitioners and academics in the reverse logistics industry, as well as a thorough description of QM tools and techniques. The book leads the potential reader to broaden their scope of thinking and acting in the new, promising area of reverse logistics, where QM can be applied.

Synthetic Data for Deep Learning (Springer Optimization and Its Applications #174)

by Sergey I. Nikolenko

This is the first book on synthetic data for deep learning, and its breadth of coverage may render this book as the default reference on synthetic data for years to come. The book can also serve as an introduction to several other important subfields of machine learning that are seldom touched upon in other books. Machine learning as a discipline would not be possible without the inner workings of optimization at hand. The book includes the necessary sinews of optimization though the crux of the discussion centers on the increasingly popular tool for training deep learning models, namely synthetic data. It is expected that the field of synthetic data will undergo exponential growth in the near future. This book serves as a comprehensive survey of the field. In the simplest case, synthetic data refers to computer-generated graphics used to train computer vision models. There are many more facets of synthetic data to consider. In the section on basic computer vision, the book discusses fundamental computer vision problems, both low-level (e.g., optical flow estimation) and high-level (e.g., object detection and semantic segmentation), synthetic environments and datasets for outdoor and urban scenes (autonomous driving), indoor scenes (indoor navigation), aerial navigation, and simulation environments for robotics. Additionally, it touches upon applications of synthetic data outside computer vision (in neural programming, bioinformatics, NLP, and more). It also surveys the work on improving synthetic data development and alternative ways to produce it such as GANs. The book introduces and reviews several different approaches to synthetic data in various domains of machine learning, most notably the following fields: domain adaptation for making synthetic data more realistic and/or adapting the models to be trained on synthetic data and differential privacy for generating synthetic data with privacy guarantees. This discussion is accompanied by an introduction into generative adversarial networks (GAN) and an introduction to differential privacy.

Wireless Power Transfer Algorithms, Technologies and Applications in Ad Hoc Communication Networks

by Sotiris Nikoletseas Yuanyuan Yang Apostolos Georgiadis

This book is the first systematic exposition on the emerging domain of wireless power transfer in ad hoc communication networks. It selectively spans a coherent, large spectrum of fundamental aspects of wireless power transfer, such as mobility management in the network, combined wireless power and information transfer, energy flow among network devices, joint activities with wireless power transfer (routing, data gathering and solar energy harvesting), and safety provisioning through electromagnetic radiation control, as well as fundamental and novel circuits and technologies enabling the wide application of wireless powering. Comprising a total of 27 chapters, contributed by leading experts, the content is organized into six thematic sections: technologies, communication, mobility, energy flow, joint operations, and electromagnetic radiation awareness. It will be valuable for researchers, engineers, educators, and students, and it may also be used as a supplement to academic courses on algorithmic applications, wireless protocols, distributed computing, and networking.

3D Nanoelectronic Computer Architecture and Implementation (Series in Material Science and Engineering)

by K. Nikolic M. Forshaw David Crawley

It is becoming increasingly clear that the two-dimensional layout of devices on computer chips hinders the development of high-performance computer systems. Three-dimensional structures will be needed to provide the performance required to implement computationally intensive tasks. 3-D Nanoelectronic Computer Architecture and Implementation reviews the state of the art in nanoelectronic device design and fabrication and discusses the architectural aspects of 3-D designs, including the possible use of molecular wiring and carbon nanotube interconnections. This is a valuable reference for those involved in the design and development of nanoelectronic devices and technology.

EU Policy and Legal Framework for Artificial Intelligence, Robotics and Related Technologies - The AI Act (Law, Governance and Technology Series #53)

by Nikos Th. Nikolinakos

Artificial Intelligence (AI) can benefit our society and economy, but also brings with it new challenges and raises legal and ethical questions. According to the author of this comprehensive analysis, it is imperative to ensure that AI is developed and applied in an appropriate legal and regulatory framework that promotes innovation and investment and, at the same time, addresses the risks associated with certain uses of AI-related technologies.Essential to understanding the relationship between policy and law, this book traces the evolution of EU policy on artificial intelligence and robotics, focusing in particular on the EU’s ethical framework for AI, which defines trust as a prerequisite for ensuring a human-centric approach.The main part of the book provides a thorough and systematic analysis of the Commission’s 2021 proposed AI Act, which establishes harmonised rules for the development, placement on the market and use of AI systems in the EU. The author painstakingly compares the Commission’s proposed AI Act with the numerous “compromise” proposals of the Council of the European Union, leading to the final version of the Council’s AI Act (general approach) and its formal adoption on 6 December 2022. The author also examines with extraordinary detail the amendments proposed by the relevant committees and political groups of the European Parliament, revealing the position the Parliament is likely to adopt in the forthcoming negotiations with the Commission and the Council on the text of the AI Act.Numerous legislative and policy documents are presented in detail, while the analysis also considers the comments made by all interested parties (e.g. the European Commission, Council of the European Union, European Parliament, governmental organisations, national competent authorities, and stakeholders/actors with different/conflicting interests, such as corporations, business and consumer associations, civil society and other non-profit organisations). In the course of its in-depth analysis, this book will provide readers with crucial insight into the reasons behind the European Institutions’ different approaches and the often contradictory interests of stakeholders. Because the policy arguments are carefully balanced and drafted with scrupulous care, this volume will establish itself as a reference resource to be consulted for years to come.

Quantum State Transfer and Network Engineering

by Georgios M. Nikolopoulos Igor Jex

Faithful communication is a necessary precondition for large-scale quantum information processing and networking, irrespective of the physical platform. Thus, the problems of quantum-state transfer and quantum-network engineering have attracted enormous interest over the last years, and constitute one of the most active areas of research in quantum information processing. The present volume introduces the reader to fundamental concepts and various aspects of this exciting research area, including links to other related areas and problems. The implementation of state-transfer schemes and the engineering of quantum networks are discussed in the framework of various quantum optical and condensed matter systems, emphasizing the interdisciplinary character of the research area. Each chapter is a review of theoretical or experimental achievements on a particular topic, written by leading scientists in the field. The volume aims at both newcomers as well as experienced researchers.

Numerical Methods and Applications: 9th International Conference, NMA 2018, Borovets, Bulgaria, August 20-24, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11189)

by Geno Nikolov Natalia Kolkovska Krassimir Georgiev

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Numerical Methods and Applications, NMA 2018, held in Borovets, Bulgaria, in August 2018. The 56 revised regular papers presented were carefully reviewed and selected from 61 submissions for inclusion in this book. The papers are organized in the following topical sections: numerical search and optimization; problem-driven numerical method: motivation and application, numerical methods for fractional diffusion problems; orthogonal polynomials and numerical quadratures; and Monte Carlo and Quasi-Monte Carlo methods.

Scala Design Patterns

by Ivan Nikolov

Write efficient, clean, and reusable code with Scala About This Book * Unleash the power of Scala and apply it in the real world * Increase your efficiency by leveraging the power of Creational, Structural, Behavioural, and Functional design patterns * Build object oriented and functional applications quickly and effectively Who This Book Is For If you want to increase your understanding of Scala and apply it to real-life application development, then this book is for you. We've also designed the book to be used as a quick reference guide while creating applications. Previous Scala programming knowledge is expected. What You Will Learn * Immerse yourself in industry-standard design patterns--structural, creational, and behavioral--to create extraordinary applications * Feel the power of traits and their application in Scala * Implement abstract and self types and build clean design patterns * Build complex entity relationships using structural design patterns * Create applications faster by applying functional design patterns In Detail Scala has become increasingly popular in many different IT sectors. The language is exceptionally feature-rich which helps developers write less code and get faster results. Design patterns make developer's lives easier by helping them write great software that is easy to maintain, runs efficiently and is valuable to the company or people concerned. You will learn about the various features of Scala and be able to apply well-known, industry-proven design patterns in your work. The book starts off by focusing on some of the most interesting features of Scala while using practical real-world examples. We will also cover the popular "Gang of Four" design patterns and show you how to incorporate functional patterns effectively. By the end of this book, you will have enough knowledge and understanding to quickly assess problems and come up with elegant solutions. Style and approach The design patterns in the book will be explained using real-world, step-by-step examples. For each design pattern, there will be hints about when to use it and when to look for something more suitable. This book can also be used as a practical guide, showing you how to leverage design patterns effectively.

Scala Design Patterns: Design modular, clean, and scalable applications by applying proven design patterns in Scala, 2nd Edition

by Ivan Nikolov

Learn how to write efficient, clean, and reusable code with ScalaKey FeaturesUnleash the power of Scala and apply it in the real world to build scalable and robust applications.Learn about using and implementing Creational, Structural, Behavioral, and Functional design patterns in Scala Learn how to build scalable and extendable applications efficientlyBook DescriptionDesign patterns make developers’ lives easier by helping them write great software that is easy to maintain, runs efficiently, and is valuable to the company or people concerned. You’ll learn about the various features of Scala and will be able to apply well-known, industry-proven design patterns in your work. The book starts off by focusing on some of the most interesting and latest features of Scala while using practical real-world examples. We will be learning about IDE’s and Aspect Oriented Programming. We will be looking into different components in Scala. We will also cover the popular "Gang of Four" design patterns and show you how to incorporate functional patterns effectively. The book ends with a practical example that demonstrates how the presented material can be combined in real-life applications. You’ll learn the necessary concepts to build enterprise-grade applications. By the end of this book, you’ll have enough knowledge and understanding to quickly assess problems and come up with elegant solutions.What you will learn Immerse yourself in industry-standard design patterns—structural, creational, and behavioral—to create extraordinary applications See the power of traits and their application in Scala Implement abstract and self types and build clean design patterns Build complex entity relationships using structural design patterns Create applications faster by applying functional design patternsWho this book is forIf you want to increase your understanding of Scala and apply design patterns to real-life application development, then this book is for you.Prior knowledge of Scala language is assumed/ expected.

Biological Networks and Pathway Analysis (Methods in Molecular Biology #1613)

by Yuri Nikolsky Tatiana V. Tatarinova

In this volume, expert practitioners present a compilation of methods of functional data analysis (often referred to as "systems biology") and its applications in drug discovery, medicine, and basic disease research. It covers such important issues as the elucidation of protein, compound and gene interactions, as well as analytical tools, including networks, interactome and ontologies, and clinical applications of functional analysis. As a volume in the highly successful Methods in Molecular Biology series, this work provides detailed description and hands-on implementation advice. Reputable, comprehensive, and cutting-edge, Biological Networks and Pathway Analysis presents both "wet lab" experimental methods and computational tools in order to cover a broad spectrum of issues in this fascinating new field.

Recreating Creativity, Reinventing Inventiveness: AI and Intellectual Property Law (Law and Change)

by Nikos Koutras and Niloufer Selvadurai

As artificial intelligence (AI) is increasingly used to generate inventions and creative works, a critical question to be addressed is whether intellectual property (IP) laws should protect such works. This book examines the critical question of whether intellectual property laws should protect works generated by artificial intelligence.If we do not wish to use IP laws to protect such works, how can we still support research, development, and innovation in society? If we do wish to use IP laws to protect such works, should the copyright, patents, and other IP rights attach to the human creator of the AI technology or the AI system? The book explores these compelling societal, economic, and legal issues. The authors evaluate the continuing relevance of existing laws, explore the divergent approaches being debated by nations around the world, and present visions for change.The book will enable both lawyers and non-lawyers to reimagine governance frameworks to create laws that equitably balance the interests of creators, investors, and end users of AI-generated works.

Modeling and Simulation with Compose and Activate

by Ramine Nikoukhah Stephen L. Campbell

This book provides a tutorial in the use of Compose and Activate, software packages that provide system modeling and simulation facilities. Advanced system modeling software provide multiple ways of creating models: models can be programmed in specialized languages, graphically constructed as block-diagrams and state machines, or expressed mathematically in equation-based languages. Compose and Activate are introduced in this text in two parts. The first part introduces the multi-language environment of Compose and its use for modeling, simulation and optimization. The second describes the graphical system modeling and optimization with Activate, an open-system environment providing signal-based modeling as well as physical system component-based modeling. Throughout both parts are applied examples from mechanical, biological, and electrical systems, as well as control and signal processing systems. This book will be an invaluable addition with many examples both for those just interested in OML and those doing industrial scale modeling, simulation, and design. All examples are worked using the free basic editions of Activate and Compose that are available.

Instant Haml

by Krzysztof Niksińskiis

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A fast-paced, example-based guide to teach you how to integrate Haml into your Rails application.If you are a developer who would like to speed up and simplify your view template creation, this book is ideal for you. A basic working knowledge of HTML and CSS, as well as some Ruby on Rails experience is recommended.

Online Teaching at Its Best: Merging Instructional Design with Teaching and Learning Research

by Linda B. Nilson Ludwika A. Goodson

Bring pedagogy and cognitive science to online learning environments Online Teaching at Its Best: Merging Instructional Design with Teaching and Learning Research, 2nd Edition, is the scholarly resource for online learning that faculty, instructional designers, and administrators have raved about. This book addresses course design, teaching, and student motivation across the continuum of online teaching modes—remote, hybrid, hyflex, and fully online—integrating these with pedagogical and cognitive science, and grounding its recommendations in the latest research. The book will help you design or redesign your courses to ensure strong course alignment and effective student learning in any of these teaching modes. Its emphasis on evidence-based practices makes this one of the most scholarly books of its kind on the market today. This new edition features significant new content including more active learning formats for small groups across the online teaching continuum, strategies and tools for scripting and recording effective micro-lectures, ways to integrate quiz items within micro-lectures, more conferencing software and techniques to add interactivity, and a guide for rapid transition from face-to-face to online teaching. You’ll also find updated examples, references, and quotes to reflect more evolved technology. Adopt new pedagogical techniques designed specifically for remote, hybrid, hyflex, and fully online learning environments Ensure strong course alignment and effective student learning for all these modes of instruction Increase student retention, build necessary support structures, and train faculty more effectively Integrate research-based course design and cognitive psychology into graduate or undergraduate programs Distance is no barrier to a great education. Online Teaching at Its Best provides practical, real-world advice grounded in educational and psychological science to help online instructors, instructional designers, and administrators deliver an exceptional learning experience even under emergency conditions.

The Quest for Artificial Intelligence

by Nils J. Nilsson

Artificial intelligence (AI) is a field within computer science that is attempting to build enhanced intelligence into computer systems. This book traces the history of the subject, from the early dreams of eighteenth-century (and earlier) pioneers to the more successful work of today's AI engineers. AI is becoming more and more a part of everyone's life. The technology is already embedded in face-recognizing cameras, speech-recognition software, Internet search engines, and health-care robots, among other applications. The book's many diagrams and easy-to-understand descriptions of AI programs will help the casual reader gain an understanding of how these and other AI systems actually work. Its thorough (but unobtrusive) end-of-chapter notes containing citations to important source materials will be of great use to AI scholars and researchers. This book promises to be the definitive history of a field that has captivated the imaginations of scientists, philosophers, and writers for centuries.

Refine Search

Showing 34,601 through 34,625 of 53,455 results