Browse Results

Showing 1 through 25 of 53,274 results

Γκέιμινγκ και βιντεοπαιχνίδια: Μια διαδραστική απόδραση από τη βαρεμάρα... (Πώς να... #95)

by Όουεν Τζόουνς

Γιατί το γκέιμινγκ αρέσει στους ανθρώπους; Εκατομμύρια επαγγελματίες και ανήσυχοι γονείς αναρωτιούνται το ίδιο εδώ και τουλάχιστον πενήντα χρόνια. Έχουν γραφτεί πολλά για το γιατί το γκέιμινγκ κατέκτησε τη νεολαία της δεκαετίας του '70 και γιατί, τώρα, άνθρωποι όλων των ηλικιών αγαπούν να παίζουν. Οι πληροφορίες σε αυτό το ηλεκτρονικό βιβλίο σχετικά με τα διάφορα είδη βιντεοπαιχνιδιών, τα παιχνίδια σε υπολογιστή, τα αρκέιντ κ.ά. είναι οργανωμένες σε 16 κεφάλαια των 500-600 λέξεων περίπου το καθένα. Ως μπόνους, σου δίνω την άδεια να χρησιμοποιήσεις το περιεχόμενο στον δικό σου ιστότοπο ή στα δικά σου ιστολόγια και ενημερωτικά δελτία, αν και είναι καλύτερα να το ξαναγράψεις με δικά σου λόγια.

كتاب العشق الإلكتروني

by عبدالله علي الأسمري

كم كانت رائعة تلك اللحظة التي قررت فيها قبل عقد من الزمن أن أدلف إلى مقهى للإنترنت في قلب مدينة الرياض لأول مرة في حياتي. رأيت عامل المقهى وقد ارتسمت على وجهه ابتسامة عريضة وهو يقودني إلى مربع صغير يحوي طاولة انتصب عليها جهاز حاسوبي ذي شاشة عريضة. بدا المكان معزولا من ثلاث جهات أما الجهة الرابعة والتي يتم من خلالها الدخول فكانت عبارة عن باب صغير ينغلق بمجرد الدخول. بعد أن استويت على المقعد هرع العامل إلى أيقونة المتصفح browser ليطمس منه سجل المستخدم السابق وذلك - على ما يبدو - لكي لا أ لقي نظرة على ما كان يفعله من جاء قبلي. لم تسعفني خبرتي إذ ذاك في تفسر مغزى ذلك التصرف

सोशल मीडिया मार्केटिंग

by अभिसार गोदारा Jonathan S. Walker

अनूदित पुस्तक की भाषा बहुत सरल एवं बोधगम्य है। हिंदी के पाठक निश्चय ही लाभान्वित होंगे। हिंदी में इस तरह की पुस्तक की बहुत कमी है। व्यवसायियों के लिए मार्गदर्शक पुस्तकें अधिकांशतः हिंदी में उपलब्ध नहीं होती हैं। हिंदी में इस पुस्तक के होने से हिंदी पाठक भी अपने व्यवसाय के लिए सोशल मीडिया के बेहतर उपयोग के बारे में जान सकेंगे।

掌握比特币-开始赚取比特币的指导: New Moon (Vampyre Ser.)

by Adidas Wilson 顺宏

比特币是由名不副实的程序员或者一群程序员发明的一种加密货币和数字支付系统,名叫Satoshi Nakamoto。 它在2009年作为开源软件发布。 系统是点对点的,交易是直接在用户之间进行的,没有中间人。 这些交易由网络节点验证,并记录在称为区块链的公共分布式账本中。 由于该系统没有中央存储库或单个管理员,比特币被称为第一个分散数字货币。 比特币除了被创造为挖矿的奖励外,还可以在合法或黑市交换其他货币,产品和服务。 截至2015年2月,超过10万商户和供应商接受比特币作为付款。 根据剑桥大学2017年的研究报告,使用加密货币钱包的用户数量达到2.9-580万,其中大部分使用比特币。

Digital Art Masters: Volume 4 (Digital Art Masters Series)

by 3dtotal.Com

Meet some of the finest 2D and 3D artists working in the industry today and discover how they create some of the most innovative digital art in the world. More than a gallery book or a coffee table book- Digital Art Masters Volume 4 includes over 50 artists and 900 unique and stunning 2D and 3D digital art. Beyond the breaktaking images is a breakdown of the techniques, challenges and tricks the artists employed while creating stunning imagery. This volume, much like the previous volumes is not your standard coffee table book nor is it our usual how-to-book. This book offers inspiration and insight for the advanced amateur and professional CG artists. The Digital Art Masters series has expanded upon the competition's gallery book concept and has added the insight and experiences of professional CG artists worldwide. Divided into 5 sections, Sci-Fi, Scene, Fantasy, Character and Cartoon, Each featured artist segement will include the thought processes behind creating unique digital images and an artist portfolio for further inspiration. Find your inspiration and discover the tips, tricks and techniques that really work.

Digital Art Masters: Volume 2

by 3dtotal.Com

Meet some of the finest digital 2D and 3D artists working in the industry today, from Patrick Beaulieu, Philip Straub, Benita Winckler, Alessandro Baldasseroni to Khalid Al Muharraqi, Marcel Baumann and Marek Denko and see how they work. More than just a gallery book - in Digital Arts Masters each artist has written a breakdown overview, with supporting imagery of how they made there piece of work.With Digital Arts Masters you'll understand the artists' thought process and discover the tips, tricks and techniques which really work.

Digital Art Masters: Volume 5

by 3dtotal.Com

Meet some of the finest 2D and 3D artists working in the industry today and discover how they create some of the most innovative digital art in the world. More than a gallery book or a coffee table book- Digital Art Masters Volume 5 includes over 50 artists and 900 unique and stunning 2D and 3D digital art. Beyond the breath taking images is a breakdown of the techniques, challenges and tricks the artists employed while creating stunning imagery. This volume, much like the previous volumes is not your standard coffee table book nor is it our usual how-to-book. New to this volume will be 5 artist video tutorials. Five artists will specifically detail an aspect of their gallery image from start to finish, offering further technique driven insight and expertise offering 2 ½ hours of additional inspiration. With a click of a mouse, artists willbe able to apply the leading techniques to their own work with access to additional video tutorials, source files, textures and digital brushes at the companion website: http://www.focalpress.com/digital-art-masters/index.html.

Digital Painting Techniques: Masters Collection

by 3dtotal.Com

Discover the tips, tricks and techniques that really work for concept artists, matte painters and animators. Compiled by the team at 3dtotal.com, Digital Painting Techniques, Volume 1 offers digital inspiration with hands-on insight and techniques from professional digital artists. More than just a gallery book - within Digital Painting Techniques each artist has written a breakdown overview, with supporting imagery of how they made their piece of work. Beginner and intermediate digital artists will be inspired by the gallery style collection of the finest examples of digital painting from world renowned digital artists. Start your mentorship into the world of digital painting today with some of the greatest digital artists in the world and delve into professional digital painting techiques, such as speed painting, custom brush creation and matte painting. Develop your digital painting skills beyond the variety of free online digital painting tutorials and apply the most up to date techniques to your digital canvas with Digital Painting Techniques for Animators.

Computer Vision, Imaging and Computer Graphics Theory and Applications: 17th International Joint Conference, VISIGRAPP 2022, Virtual Event, February 6–8, 2022, Revised Selected Papers (Communications in Computer and Information Science #1815)

by A. Augusto de Sousa Kurt Debattista Alexis Paljic Mounia Ziat Christophe Hurter Helen Purchase Giovanni Maria Farinella Petia Radeva Kadi Bouatouch

This book constitutes the referred proceedings of the 17th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, VISIGRAPP 2022, Virtual Event, February 6–8, 2022. The 15 full papers included in this book were carefully reviewed and selected from 392 submissions. The purpose of VISIGRAPP is to bring together researchers and practitioners interested in both theoretical advances and applications of computer vision, computer graphics and information visualization. VISIGRAPP is composed of four co-located conferences, each specialized in at least one of the aforementioned main knowledge areas, namely GRAPP, IVAPP, HUCAPP and VISAPP.

Computer Vision, Imaging and Computer Graphics Theory and Applications: 16th International Joint Conference, Visigrapp 2021, Vienna, Austria, February 8-10, 2021, Revised Selected Papers (Communications In Computer And Information Science Series #1691)

by A. Augusto de Sousa Vlastimil Havran Alexis Paljic Tabitha Peck Christophe Hurter Helen Purchase Giovanni Maria Farinella Petia Radeva Kadi Bouatouch

<p>This book constitutes the refereed proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, VISIGRAPP 2021, held as a virtual event, February 8–10, 2021.<p> <p>The 16 full papers presented in this volume were carefully reviewed and selected from 371 submissions. The purpose of VISIGRAPP is to bring together researchers and practitioners interested in both theoretical advances and applications of computer vision, computer graphics and information visualization. VISIGRAPP is composed of four co-located conferences, each specialized in at least one of the aforementioned main knowledge areas, namely GRAPP, IVAPP, HUCAPP and VISAPP.<p> <p>The contributions were organized in topical sections as follows: Computer Graphics Theory and Applications; Human Computer Interaction Theory and Applications; Information Visualization Theory and Applications; Computer Vision Theory and Applications.<p>

Artificial Intelligent Techniques for Electric and Hybrid Electric Vehicles

by Chitra A. P. Sanjeevikumar, Jens Bo Holm-Nielsen S. Himavathi

Electric vehicles/hybrid electric vehicles (EV/HEV) commercialization is still a challenge in industries in terms of performance and cost. The performance along with cost reduction are two tradeoffs which need to be researched to arrive at an optimal solution. This book focuses on the convergence of various technologies involved in EV/HEV. The book brings together the research that is being carried out in the field of EV/HEV whose leading role is by optimization techniques with artificial intelligence (AI). Other featured research includes green drive schemes which involve the possible renewable energy sources integration to develop eco-friendly green vehicles, as well as Internet of Things (IoT)-based techniques for EV/HEVs. Electric vehicle research involves multi-disciplinary expertise from electrical, electronics, mechanical engineering and computer science. Consequently, this book serves as a point of convergence wherein all these domains are addressed and merged and will serve as a potential resource for industrialists and researchers working in the domain of electric vehicles.

Computational Science and its Applications

by A. H. Siddiqi, R. C. Singh, G. D. Veerappa Gowda

Computational science is a rapidly growing multidisciplinary field concerned with the design, implementation, and use of mathematical models to analyze and solve real-world problems. It is an area of science that spans many disciplines and which involves the development of models and allows the use of computers to perform simulations or numerical analysis to understand problems that are computational and theoretical. Computational Science and its Applications provides an opportunity for readers to develop abilities to pose and solve problems that combine insights from one or more disciplines from the natural sciences with mathematical tools and computational skills. This requires a unique combination of applied and theoretical knowledge and skills. The topics covered in this edited book are applications of wavelet and fractals, modeling by partial differential equations on flat structure as well as on graphs and networks, computational linguistics, prediction of natural calamities and diseases like epilepsy seizure, heart attack, stroke, biometrics, modeling through inverse problems, interdisciplinary topics of physics, mathematics, and medical science, and modeling of terrorist attacks and human behavior. The focus of this book is not to educate computer specialists, but to provide readers with a solid understanding of basic science as well as an integrated knowledge on how to use essential methods from computational science. Features: Modeling of complex systems Cognitive computing systems for real-world problems Presentation of inverse problems in medical science and their numerical solutions Challenging research problems in many areas of computational science This book could be used as a reference book for researchers working in theoretical research as well as those who are doing modeling and simulation in such disciplines as physics, biology, geoscience, and mathematics, and those who have a background in computational science.

Packet Tracer Network Simulator

by Jesin A

A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer. Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized hardware. This book assumes that you have a good amount of Cisco networking knowledge, and it will focus more on Packet Tracer rather than networking.

Bangabandhu and Digital Bangladesh: First International Conference, ICBBDB 2021, Dhaka, Bangladesh, December 30, 2021, Revised Selected Papers (Communications in Computer and Information Science #1550)

by A. K. M. Muzahidul Islam Jia Uddin Nafees Mansoor Shahriar Rahman Shah Murtaza Rashid Al Masud

This book constitutes selected papers presented during the First International Conference on Bangabandhu and Digital Bangladesh, ICBBDB 2021, held in Dhaka, Bangladesh, in December 2021. Due to the COVID-19 pandemic the conference was partly held online. The 16 papers presented were thoroughly reviewed and selected from the 90 submissions. They present research in the areas of artificial intelligence, machine learning, image processing, blockchain technology, human-computer interaction, etc.

Adoption of LMS in Higher Educational Institutions of the Middle East (Advances in Science, Technology & Innovation)

by Rashid A. Khan Hassan Qudrat-Ullah

This book discusses the adoption of learning management systems (LMS) in higher education institutions. It presents influential predictors that may impact instructors’ behavioral intention to adopt learning management systems in the context of Arab culture, as well as a unique model of technology acceptance that draws on and combines previous technology adoption models (i.e., a modified unified theory of acceptance and use of technology model – UTAUT2). Moreover, this study extends the UTAUT2 model by including Hofstede’s (1980) cultural dimensions, and technology awareness as the moderators of the model. It also describes the explanatory technique approach used to collect quantitative data from the instructors at higher education institutions in Saudi Arabia and were analyzed with structural equation modeling using SPSS/Amos software. The findings revealed that facilitating conditions were the strongest predictor of behavioral intention to adopt an LMS, followed by performance expectancy and hedonic motivation, technology awareness, and cultural dimensions exerted a moderating influence on instructors’ behavioral intention to use LMS in their teaching. By including new constructs, this becomes the first study of its kind exploring instructors’ use of LMS in Higher Educational Institutions of Saudi Arabia and other countries of the Middle East. It offers practical insights for a broad range of researchers and professionals at higher education institutions and serves as a reference guide for designers of learning management systems (e.g., blackboard systems), policymakers, and the Ministry of Education staff.

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

by Monnappa K A

Understand malware analysis and its practical implementationKey FeaturesExplore the key concepts of malware analysis and memory forensics using real-world examplesLearn the art of detecting, analyzing, and investigating malware threatsUnderstand adversary tactics and techniquesBook DescriptionMalware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches.This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents.What you will learnCreate a safe and isolated lab environment for malware analysisExtract the metadata associated with malwareDetermine malware's interaction with the systemPerform code analysis using IDA Pro and x64dbgReverse-engineer various malware functionalitiesReverse engineer and decode common encoding/encryption algorithmsPerform different code injection and hooking techniquesInvestigate and hunt malware using memory forensicsWho this book is forThis book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you’ll be able to get most out of this book.

Cognitive Computing for Internet of Medical Things

by A. Prasanth, D. Lakshmi, Rajesh Kumar Dhanaraj, Balamurugan Balusamy, P.C. Sherimon

Cognitive Computing for Internet of Medical Things (IoMT) offers a complete assessment of the present scenario, role, challenges, technologies, and impact of IoMT-enabled smart healthcare systems. It contains chapters discussing various biomedical applications under the umbrella of the IoMT. Key Features Exploits the different prospects of cognitive computing techniques for the IoMT and smart healthcare applications Addresses the significance of IoMT and cognitive computing in the evolution of intelligent medical systems for biomedical applications Describes the different computing techniques of cognitive intelligent systems from a practical point of view: solving common life problems Explores the technologies and tools to utilize IoMT for the transformation and growth of healthcare systems Focuses on the economic, social, and environmental impact of IoMT-enabled smart healthcare systems This book is primarily aimed at graduates, researchers and academicians working in the area of development of the application of the of the application of the IoT in smart healthcare. Industry professionals will also find this book helpful.

New Paradigms in Flow Battery Modelling (Engineering Applications of Computational Methods #16)

by Akeel A. Shah Puiki Leung Qian Xu Pang-Chieh Sui Wei Xing

This book provides a comprehensive review of the latest modelling developments in flow batteries, as well as some new results and insights. Flow batteries have long been considered the most flexible answer to grid scale energy storage, and modelling is a key component in their development. Recent modelling has moved beyond macroscopic methods, towards mesoscopic and smaller scales to select materials and design components. This is important for both fundamental understanding and the design of new electrode, catalyst and electrolyte materials. There has also been a recent explosion in interest in machine learning for electrochemical energy technologies. The scope of the book includes these latest developments and is focused on advanced techniques, rather than traditional modelling paradigms. The aim of this book is to introduce these concepts and methods to flow battery researcher, but the book would have a much broader appeal since these methods also employed in other battery and fuel cell systems and far beyond. The methods will be described in detail (necessary fundamental material in Appendices). The book appeals to graduate students and researchers in academia/industry working in electrochemical systems, or those working in computational chemistry/machine learning wishing to seek new application areas.

Nature-Inspired Optimization Algorithms

by Vasuki A

Nature-Inspired Optimization Algorithms, a comprehensive work on the most popular optimization algorithms based on nature, starts with an overview of optimization going from the classical to the latest swarm intelligence algorithm. Nature has a rich abundance of flora and fauna that inspired the development of optimization techniques, providing us with simple solutions to complex problems in an effective and adaptive manner. The study of the intelligent survival strategies of animals, birds, and insects in a hostile and ever-changing environment has led to the development of techniques emulating their behavior. This book is a lucid description of fifteen important existing optimization algorithms based on swarm intelligence and superior in performance. It is a valuable resource for engineers, researchers, faculty, and students who are devising optimum solutions to any type of problem ranging from computer science to economics and covering diverse areas that require maximizing output and minimizing resources. This is the crux of all optimization algorithms. Features: Detailed description of the algorithms along with pseudocode and flowchart Easy translation to program code that is also readily available in Mathworks website for some of the algorithms Simple examples demonstrating the optimization strategies are provided to enhance understanding Standard applications and benchmark datasets for testing and validating the algorithms are included This book is a reference for undergraduate and post-graduate students. It will be useful to faculty members teaching optimization. It is also a comprehensive guide for researchers who are looking for optimizing resources in attaining the best solution to a problem. The nature-inspired optimization algorithms are unconventional, and this makes them more efficient than their traditional counterparts.

Creating Signature Stories: Strategic Messaging that Persuades, Energizes and Inspires

by David Aaker

Stories are orders of magnitude which are more effective than facts at achieving attention, persuading, being remembered, and inspiring involvement. Signature stories—intriguing, authentic, and involving narratives—apply the power of stories to communicate a strategic message. Marketing professionals, coping with the digital revolution and the need to have their strategic message heard internally and externally, are realizing that a digital strategy revolves around content and that content is stories.Creating Signature Stories shows organizations how to introduce storytelling into their strategic messaging, and guides organizations to find, or even create, signature stories and leverage them over time. With case studies built into every chapter, organizations will realize the power of storytelling to energize readers, gain visibility, persuade audiences, and inspire action.

Owning Game-Changing Subcategories: Uncommon Growth in the Digital Age

by David Aaker

Owning Game-Changing Subcategories is about creating organizational growth in the digital age by creating and owning game-changing subcategories fueled by digital.Owning Game-Changing Subcategories outlines the path to finding, managing, and leveraging new subcategories. In the digital age, the path has been made wider, shorter, and more frequently traveled. Throughout Owning Game-Changing Subcategories, David Aaker discusses certain aspects of the digital age that alter this path, such as E-commerce providing fast, inexpensive market access bypassing the cost of gaining distribution into storefront retailers or creating personal sales teams and social media and websites enabling communication on steroids in comparison with traditional use of advertising or events. Growth is not only a success measure but also creates energy and opportunity for customers and employees. And such growth almost never occurs with “my brand is better than your brand” marketing. Owning Game-Changing Subcategories explores the only ways to grow a business (with rare exceptions) which is to:develop new “must haves” that define a game-changing subcategory that provides a new or markedly superior buying or use experience or brand relationship to a core customer base;become the exemplar brand that represents the subcategory and drives its visibility, positioning, and success; and create barriers to competitors that could include “must-have” associations and a basis of relationships that go beyond functional benefits.

Photoshop CS2 RAW

by Mikkel Aaland

The RAW file format is the uncompressed data file captured by a digital camera's electronic sensor. When your camera saves an image in RAW format, settings like white balance, sharpening, contrast and saturation are not applied to the image but are saved instead in a separate header. Because RAW files remain virtually untouched by in-camera processing, they are essentially the digital equivalent to exposed but undeveloped film. This makes RAW an increasingly popular format with amateur and professional digital photographers, because it affords greater flexibility and control during the editing process-if you know how to work with RAW files. Most digital camera manufacturers supply their own software for converting RAW data, as do some third party vendors. Increasingly, however, the RAW converter of choice is a plug-in included in the latest version of Adobe Photoshop, the most popular and widely-used digital image editing tool in the world. Adobe Photoshop CS2 is emerging as the best place to edit RAW images, and the best way to master this new format is with Photoshop CS2 RAW. An important book dedicated to working with RAW in Photoshop, this comprehensive guide features a unique design that helps readers grasp the subject through visual instruction and prompts. The entire RAW process is explored, from shooting to using the Adobe plug-in converter and new Bridge navigation software. The primary focus of Photoshop RAW is, as the title suggests, Photoshop editing technique: automating RAW workflow, correcting exposures, extending exposure range, manipulating grayscale and working with the new DNG (Digital Negative) open standard that Adobe supports. Presented by photographer Mikkel Aaland, a pioneer of digital photography and author of eight books, including O'Reilly's Photoshop for the Web and the award-winning Shooting Digital, Photoshop CS2 RAW investigates and instructs in an accessible visual style. Required reading for professionals and dedicated photo hobbyists alike.

Microsoft Dynamics AX 2012 Financial Management

by Mohamed Aamer

This book is a practical, hands-on guide that covers both the basic and advanced concepts of financial management using Microsoft Dynamics AX.Microsoft Dynamics AX Financial Management is for Microsoft Dynamics AX solution architects, application consultants, support engineers, pre-technical sales consultants, and project managers on the partner side, as well as chief financial officers, financial controllers, accounting managers, key users, business analysts, and chief information officers on the customer side. A basic knowledge of financial terms, concepts, and Microsoft Dynamics AX terminologies will help you better understand the concepts covered in this book.

Microsoft Dynamics AX 2012 R3 Financial Management

by Mohamed Aamer

This book is intended for application consultants, controllers, CFOs, and other professionals who are engaged in a Microsoft Dynamics AX implementation project. Basic knowledge of financial terms, concepts, and Microsoft Dynamics AX terminologies is required.

Guide to Computational Geometry Processing

by Henrik Aanæs François Anton J. Andreas Bærentzen Jens Gravesen

This book reviews the algorithms for processing geometric data, with a practical focus on important techniques not covered by traditional courses on computer vision and computer graphics. Features: presents an overview of the underlying mathematical theory, covering vector spaces, metric space, affine spaces, differential geometry, and finite difference methods for derivatives and differential equations; reviews geometry representations, including polygonal meshes, splines, and subdivision surfaces; examines techniques for computing curvature from polygonal meshes; describes algorithms for mesh smoothing, mesh parametrization, and mesh optimization and simplification; discusses point location databases and convex hulls of point sets; investigates the reconstruction of triangle meshes from point clouds, including methods for registration of point clouds and surface reconstruction; provides additional material at a supplementary website; includes self-study exercises throughout the text.

Refine Search

Showing 1 through 25 of 53,274 results