Browse Results

Showing 36,451 through 36,475 of 53,546 results

Probabilistic Machine Learning for Civil Engineers

by James-A. Goulet

An introduction to key concepts and techniques in probabilistic machine learning for civil engineering students and professionals; with many step-by-step examples, illustrations, and exercises.This book introduces probabilistic machine learning concepts to civil engineering students and professionals, presenting key approaches and techniques in a way that is accessible to readers without a specialized background in statistics or computer science. It presents different methods clearly and directly, through step-by-step examples, illustrations, and exercises. Having mastered the material, readers will be able to understand the more advanced machine learning literature from which this book draws.The book presents key approaches in the three subfields of probabilistic machine learning: supervised learning, unsupervised learning, and reinforcement learning. It first covers the background knowledge required to understand machine learning, including linear algebra and probability theory. It goes on to present Bayesian estimation, which is behind the formulation of both supervised and unsupervised learning methods, and Markov chain Monte Carlo methods, which enable Bayesian estimation in certain complex cases. The book then covers approaches associated with supervised learning, including regression methods and classification methods, and notions associated with unsupervised learning, including clustering, dimensionality reduction, Bayesian networks, state-space models, and model calibration. Finally, the book introduces fundamental concepts of rational decisions in uncertain contexts and rational decision-making in uncertain and sequential contexts. Building on this, the book describes the basics of reinforcement learning, whereby a virtual agent learns how to make optimal decisions through trial and error while interacting with its environment.

State Fragility Around the World: Fractured Justice and Fierce Reprisal

by Laurie A. Gould Matthew Pate

Failed and fragile states often govern through the criminalization of otherwise inconsequential or tolerated acts. These weak states also frequently use kidnapping, murder, and other violent or oppressive tactics to maintain order and stay in power. State Fragility Around the World: Fractured Justice and Fierce Reprisal analyzes the path to state f

Mastering API Architecture

by James Gough Daniel Bryant Matthew Auburn

Most organizations with a web presence build and operate APIs; the doorway for customers to interact with the company's services. Designing, building, and managing these critical programs affect everyone in the organization, from engineers and product owners to C-suite executives. But the real challenge for developers and solution architects is creating an API platform from the ground up.With this practical book, you'll learn strategies for building and testing REST APIs that use API gateways to combine offerings at the microservice level. Authors James Gough, Daniel Bryant, and Matthew Auburn demonstrate how simple additions to this infrastructure can help engineers and organizations migrate to the cloud; and open the opportunity to connect internal services using technologies like a service mesh.Learn API fundamentals and architectural patterns for building an API platformUse practical examples to understand how to design, build, and test API-based systemsDeploy, operate, and configure key components of an API platformUse API gateways and service meshes appropriately, based on case studiesUnderstand core security and common vulnerabilities in API architectureSecure data and APIs using threat modeling and technologies like OAuth2 and TLSLearn how to evolve existing systems toward API- and cloud-based architectures

Energy Efficient Servers: Blueprints for Data Center Optimization

by Corey Gough Ian Steiner Winston Saunders

Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outlines the power and performance impact of these features and the role firmware and software play in initialization and control. Using examples from cloud, HPC, and enterprise environments, the book demonstrates how various power management technologies are utilized across a range of server utilization. It teaches the reader how to monitor, analyze, and optimize their environment to best suit their needs. It shares optimization techniques used by data center administrators and system optimization experts at the world's most advanced data centers. What you'll learn * Develop a deep understanding of power management in modern servers - from data center and systems software to low-level processor technologies - and all the pieces in-between. * Build an understanding of technologies used in cores, caches, memory, system agents, processor interconnects, and PCI-E to manage power. * Learn techniques for monitoring and characterizing server power management technologies including component and system level impact. * Develop strategies to improve infrastructure utilization and cost-effectiveness, to guide configuration and purchasing decisions, and to enhance application deployment. * Learn new techniques to optimize a server for energy efficiency while still meeting the service level requirements of software, related systems in the data center, and end customers. Who this book is for Primarily: Engineers and IT professionals. More broadly, the book appeals to a wide technologist audience - anyone who designs or relies on a server to run services and applications - from software engineers, to system administrators, to equipment and system manufacturers, to data center operators. Table of Contents Foreword/Preface Chapter 1: Why Data Center Efficiency Matters Chapter 2: CPU and Memory Power Management Chapter 3: Memory and I/O Power Management Chapter 4: Software Architecture Chapter 5: BIOS and Management Firmware Chapter 6: Operating Systems Chapter 7: Monitoring Chapter 8: Characterization and Optimization Chapter 9: Data Center Management Chapter 10: Terms and Technology Appendix

Einsatz der Blockchain-Technologie im Energiesektor: Grundlagen, Anwendungsgebiete und Konzepte (essentials)

by Alexander Goudz Melisa Jasarevic

Die Blockchain-Technologie erweist sich als eine neue, hochinteressante Technologie, die seit der Einführung des Bitcoins in zahlreichen Anwendungsfeldern diskutiert wird. Die zahlreichen Forschungsprojekte untermauern die hohen Erwartungen an diese Technologie. Das vorliegende Essential soll ein grundlegendes Verständnis über die Blockchain-Technologie vermitteln und insbesondere den Fokus auf die technologische Ausgestaltung und Konzeptentwicklung in ausgewählten Bereichen der Energiewirtschaft legen.

Human Impact on the Natural Environment: Past, Present, And Future

by Andrew S. Goudie

A brand new edition of the definitive textbook on humankind’s impact on the Earth’s environment—now in full color This classic text explores the multitude of impacts that humans have had over time upon vegetation, animals, soils, water, landforms, and the atmosphere. It considers the ways in which climate changes and modifications in land cover may change the environment in coming decades. Thoroughly revised to cover the remarkable transformation in interest that humans are having in the environment, this book examines previously uncovered topics, such as rewilding, ecosystem services, techniques for study, novel and no analogue ecosystems, and more. It also presents the latest views on big themes such as human origins, the anthropocene, domestication, extinctions, and ecological invasions. Extensively re-written, Human Impact on the Natural Environment, Eighth Edition contains many new and updated statistical tables, figures, and references. It offers enlightening chapters that look at the past and present state of the world—examining our impact on the land itself and the creatures that inhabit it; the oceans, lakes, rivers and streams; and the climate and atmosphere. The book also takes a deep look at our future impact on the planet and its resources—our affect on the coastal environments, the cryosphere and the drylands, as well as the hydrological and geomorphological impacts. Fully updated to take account of recent advances in our understanding of global warming and other phenomena Offers current opinions on such topics as human origins, the anthropocene, domestication, extinctions, and ecological invasions Features a full-color presentation to allow for more and clearer photographs and diagrams Contains more international case studies than previous editions to balance UK examples Human Impact on the Natural Environment is essential reading for undergraduates in geography and environmental science, and for those who want a thorough, wide-ranging and balanced overview of the impacts of humans upon natural processes and systems from the Stone Age to the Anthropocene and who wish to understand the major environmental issues that concern the human race at the present time.

Security Awareness Design in the New Normal Age

by Wendy F. Goucher

People working in our cyber world have access to a wide range of information including sensitive personal or corporate information which increases the risk to it. One of the aspects of the protection of this data is to train the user to behave more securely. This means that every person who handles sensitive information, their own or that of other people, be aware of the risks that their use can pose as well as how to do their job in such a way as to reduce that risk. The approach we use for that is called ‘Security awareness’ but would be more accurately described as security ‘un-awareness’ because most of the problems come where the user doesn’t know about a risk from their behaviour, or its potential impact. In these post COVID days of ‘New Normal’ working, in which staff spend more of their time working at home, organisations are still responsible for the protection of sensitive personal and corporate data. This means that it is more important than ever to create an effective security awareness communication process. This book will primarily consider the problem of hitting that ‘Sweet Spot’ in the age of ‘New Normal' working, which means that the knowledge about secure practice is not only understood and remembered, but also reliably put into practice – even when a person is working alone. This will be informed by academic research as well as experience, both my own and learnt from my fellow professionals, and then will be used to demonstrate how ‘New Normal’ working can improve security awareness as well as challenge it.

Beautiful Testing

by Adam Goucher Tim Riley

Successful software depends as much on scrupulous testing as it does on solid architecture or elegant code. But testing is not a routine process, it's a constant exploration of methods and an evolution of good ideas. Beautiful Testing offers 23 essays from 27 leading testers and developers that illustrate the qualities and techniques that make testing an art. Through personal anecdotes, you'll learn how each of these professionals developed beautiful ways of testing a wide range of products -- valuable knowledge that you can apply to your own projects. Here's a sample of what you'll find inside: Microsoft's Alan Page knows a lot about large-scale test automation, and shares some of his secrets on how to make it beautiful Scott Barber explains why performance testing needs to be a collaborative process, rather than simply an exercise in measuring speed Karen Johnson describes how her professional experience intersected her personal life while testing medical software Rex Black reveals how satisfying stakeholders for 25 years is a beautiful thing Mathematician John D. Cook applies a classic definition of beauty, based on complexity and unity, to testing random number generatorsAll author royalties will be donated to the Nothing But Nets campaign to save lives by preventing malaria, a disease that kills millions of children in Africa each year. This book includes contributions from: Adam Goucher Linda Wilkinson Rex Black Martin Schröder Clint Talbert Scott Barber Kamran Khan Emily Chen Brian Nitz Remko Tronçon Alan Page Neal Norwitz Michelle Levesque Jeffrey Yasskin John D. Cook Murali Nandigama Karen N. Johnson Chris McMahon Jennitta Andrea Lisa Crispin Matt Heusser Andreas Zeller David Schuler Tomasz Kojm Adam Christian Tim Riley Isaac Clerencia

Complex Systems Design & Management: Proceedings of the Seventh International Conference on Complex Systems Design & Management, CSD&M Paris 2016

by Eric Goubault Daniel Krob Gauthier Fanmuy François Stephan

This book contains all refereed papers that were accepted to the Complex Systems Design & Management (CSDM 2010) international conference that took place in Paris (France), October 27 29, 2010 (Website: http://www. csdm2010. csdm. fr). These proceedings covers the most recent trends in the emerging field of complex systems sciences & practices from an industrial and academic perspective, including the main industrial domains (transport, defense & security, electronics, energy & environment, health, communications & media, e-services), scientific & technical topics (systems fundamentals, systems architecture & engineering, systems metrics & quality, systemic tools) and system types (transportation systems, embedded systems, software & information systems, systems of systems, artificial ecosystems). The CSDM 2010 conference is organized under the guidance of the CESAMES non profit organization (Website: http://www. cesames. net).

Double Hierarchy Linguistic Term Set and Its Extensions: Theory and Applications (Studies in Fuzziness and Soft Computing #396)

by Xunjie Gou Zeshui Xu

This book presents the concept of the double hierarchy linguistic term set and its extensions, which can deal with dynamic and complex decision-making problems. With the rapid development of science and technology and the acceleration of information updating, the complexity of decision-making problems has become increasingly obvious. This book provides a comprehensive and systematic introduction to the latest research in the field, including measurement methods, consistency methods, group consensus and large-scale group consensus decision-making methods, as well as their practical applications. Intended for engineers, technicians, and researchers in the fields of computer linguistics, operations research, information science, management science and engineering, it also serves as a textbook for postgraduate and senior undergraduate university students.

Real-time Communication Protocols for Multi-hop Ad-hoc Networks: Wireless Networking in Production and Control Systems (Computer Communications and Networks)

by Reinhard Gotzhein

This book focuses on core functionalities for wireless real-time multi-hop networking with TDMA (time-division multiple access) and their integration into a flexible, versatile, fully operational, self-contained communication system. The use of wireless real-time communication technologies for the flexible networking of sensors, actuators, and controllers is a crucial building block for future production and control systems. WirelessHART and ISA 100.11a, two technologies that have been developed predominantly for industrial use, are currently available. However, a closer analysis of these approaches reveals certain deficits. Current research on wireless real-time communication systems shows potential to remove these limitations, resulting in flexible, versatile, and robust solutions that can be implemented on today’s low-cost and resource-constrained hardware platforms. Unlike other books on wireless communication, this book presents protocols located on MAC layer and above, and build on the physical (PHY) layer of standard wireless communication technologies.

System Level Design from HW/SW to Memory for Embedded Systems: 5th Ifip Tc 10 International Embedded Systems Symposium, Iess 2015, Foz Do Iguaçu, Brazil, November 3-6, 2015, Proceedings (IFIP Advances in Information and Communication Technology #523)

by Marcelo Götz Gunar Schirner Marco Aurélio Wehrmeister Mohammad Abdullah Al Faruque Achim Rettberg

This book constitutes the refereed proceedings of the 5th IFIP TC 10 International Embedded Systems Symposium, IESS 2015, held in Foz do Iguaçu, Brazil, in November 2015. The 18 full revised papers presented were carefully reviewed and selected from 25 submissions. The papers present a broad discussion on the design, analysis and verification of embedded and cyber-physical systems including design methodologies, verification, performance analysis, and real-time systems design. They are organized in the following topical sections: cyber-physical systems, system-level design; multi/many-core system design; memory system design; and embedded HW/SW design and applications.

Video Image Detection Systems Installation Performance Criteria

by Daniel T. Gottuk

Video Image Detection Systems Installation Performance Criteria outlines fire performance objectives and related criteria for VID systems. The book also indentifies conceptual characteristic fire, smoke and nuisance scenarios within a series of selected environments, and examines related performance and installation issues as well. Video Image Detection Systems Installation Performance Criteria is designed for practitioners as a reference guide for implementing video systems capable of quickly detecting smoke and fire. Researchers working in a related field will also find the book valuable.

White-Collar Crime Online: Deviance, Organizational Behaviour and Risk

by Petter Gottschalk Christopher Hamerton

This initiating monograph provides the first thorough examination of the concept of white-collar crime online. Applying an offender-based perspective which considers the central role of convenience, it seeks to inform, improve and develop the current literature on cybercrime, whilst paying particular attention to its founding category within criminology. It argues that white-collar crime has receded from criminological perspectives on cybercrime in recent years and that a detailed, rich re-assessment of white-collar crime in contemporary digital societies is needed. Following a theoretical introduction, the book develops to discuss, inter alia, implications for corporate reputation, the various organizational roles utilized in mitigating external and internal threats, the unique considerations involved in law enforcement efforts, and likely future directions within the field. White-Collar Crime Online recognises the strong lineage and correlation that exists between the study of white-collar crime and cybercrime. Using convenience theory within a comparative analysis which includes case-studies, the book explores both European and American paradigms, perspectives and models to determine where white-collar crime exists within the contemporary workplace and how this might relate to the ongoing discourse on cybercrime. In doing so it revaluates criminological theory within the context of changing patterns of business, the workplace, social rules, systems of governance, decision making, social ordering and control. White-Collar Crime Online will speak to criminologists, sociologists and professionals; including those interested in cyber-security, economics, technology and computer science.

Understanding White-Collar Crime: A Convenience Perspective

by Petter Gottschalk

Understanding White-Collar Crime develops the concept of convenience as the main explanation for crime occurrence. Examining all three dimensions of crime—economic, organizational, and behavioral—the book argues that when white-collar crime becomes less convenient, crime rates will go down. By applying convenience theory to an empirical sample of convicted white-collar criminals, the text teaches criminal justice students and ethics and compliance practitioners to identify and understand how opportunity affects real-world criminal situations. Internal investigations of white-collar crime are discussed, and corporate social responsibility against white-collar crime is emphasized. Understanding White-Collar Crime: A Convenience Perspective examines not only the theories behind white-collar crime, but also explores methods used in criminal justice investigations into corporate fraud, and emphasizes the importance of corporate social responsibility in reducing crimes of this nature. Criminal justice students and practitioners should not miss this close look into the world of white-collar crime.

The Use Case and Smart Grid Architecture Model Approach

by Marion Gottschalk Mathias Uslar Christina Delfs

This book introduces readers to the fundamentals of the IEC 62559 Use Case Methodology, explains how it is related to the Smart Grid Architecture Model (SGAM), and details how a holistic view for both architecture and requirements engineering can be achieved. It describes a standardized and holistic approach to requirements engineering for smart grid projects based on work conducted in the context of the EU M/490 standardization mandate. Over the last years, this method has been established in Europe as the basic building block of requirements engineering in the utilities sector. The authors present a canonical, structured approach that users can apply to the Use Case Methodology and the SGAM, as well as open tools for this purpose. The application in various domains outside the smart grid is also discussed, as it can be used for critical infrastructures or system-of-systems domains like Industrie 4. 0 and Ambient Assisted Living. Accordingly, the book also presents various architecture models for different fields of application, like EMAM, SCIAM, RAMI 4. 0, and MAF.

Learning jqPlot

by Scott Gottreu

If you are a developer with a good understanding of JavaScript and jQuery and have been burdened with the task of analyzing and presenting some data, this book will provide you with the start you need to create some very attractive data visualizations.

Spreadsheet Tools for Engineers Using Excel 2007

by Byron S. Gottfried

This practical text is a perfect fit for introductory engineering courses by successfully combining an introduction to Excel fundamentals with a clear presentation on how Excel can be used to solve common engineering problems. Updated to ensure compatibility with Excel 2007,Spreadsheet Tools for Engineers Using Excel 2007provides beginning engineering students with a strong foundation in problem solving using Excel as the modern day equivalent of the slide rule. As part of McGraw-Hill's BEST series for freshman engineering curricula, this text is particularly geared toward introductory students. The author provides plenty of background information on technical terms, and provides numerous examples illustrating both traditional and spreadsheet solutions for a variety of engineering problems. The first three chapters introduce the basics of problem solving and Excel fundamentals. Beyond that, the chapters are largely independent of one another. Topics covered include graphing data, unit conversions, data analysis, interpolation and curve fitting, solving equations, evaluating integrals, creating macros, and comparing economic alternatives.

The Software Requirements Memory Jogger: A Pocket Guide to Help Software and Business Teams Develop and Manage Requirements

by Ellen Gottesdiener

The Software Requirements Memory Jogger is an easy-to-use guide for developing and managing precise software requirements. The Software Requirements Memory Jogger provides every member of your project team with the tools and techniques to foster communication between business and technical teams on the necessary requirements for producing successful software. The Software Requirements Memory Jogger will benefit all stakeholders at any organizational level involved in software development projects management team, practitioners, QA/QC personnel. - Explore practical steps, tips, and examples to help you develop and manage requirements - Follow the User Requirements Roadmap a toolkit of techniques for discovering and analyzing user requirements - Streamline communications between all requirements stakeholders - Learn how to write clear, concise requirements documents

Formal Techniques for Distributed Objects, Components, and Systems: 40th IFIP WG 6.1 International Conference, FORTE 2020, Held as Part of the 15th International Federated Conference on Distributed Computing Techniques, DisCoTec 2020, Valletta, Malta, June 15–19, 2020, Proceedings (Lecture Notes in Computer Science #12136)

by Alexey Gotsman Ana Sokolova

This book constitutes the proceedings of the 40th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2020, held in Valletta, Malta, in June 2020, as part of the 15th International Federated Conference on Distributed Computing Techniques, DisCoTec 2020.* The 10 full papers and 1 short paper presented were carefully reviewed and selected from 25 submissions. The conference is dedicated to fundamental research on theory, models, tools, and applications for distributed systems. *The conference was held virtually due to the COVID-19 pandemic. Chapter ‘Conformance-Based Doping Detection for Cyber-Physical Systems’ is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Mobile Computing, Applications, and Services: 9th International Conference, Mobicase 2018, Osaka, Japan, February 28 - March 2, 2018, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #240)

by Yusuke Gotoh Sozo Inoue Ren Ohmura Kazuya Murao

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Mobile Computing, Applications, and Services (MobiCASE 2015) held in Osaka, Japan, February 28 – March 2, 2018. The 10 full papers and 13 demo/ poster papers were carefully reviewed and selected from 35 submissions. The conference papers are covering intelligent caching; activity recognition and crowdsourcing; mobile frameworks; middleware; interactive applications; and mobility.

Lean UX

by Jeff Gothelf Josh Seiden

Lean UX is synonymous with modern product design and development. By combining human-centric design, agile ways of working, and a strong business sense, designers, product managers, developers, and scrum masters around the world are making Lean UX the leading approach for digital product teams today.In the third edition of this award-winning book, authors Jeff Gothelf and Josh Seiden help you focus on the product experience rather than deliverables. You'll learn tactics for integrating user experience design, product discovery, agile methods, and product management. And you'll discover how to drive your design in short, iterative cycles to assess what works best for businesses and users. Lean UX guides you through this change--for the better.Facilitate the Lean UX process with your team with the Lean UX CanvasEnsure every project starts with clear customer-centric success criteriaUnderstand the role of designer on a agile teamWrite and contribute design and experiment stories to the backlogEnsure that design work takes place in every sprintBuild product discovery into your team's "velocity"

Lean UX: Applying Lean Principles to Improve User Experience

by Jeff Gothelf Josh Seiden

<p>The Lean UX approach to interaction design is tailor-made for today&#8217;s web-driven reality. In this insightful book, leading advocate Jeff Gothelf teaches you valuable Lean UX principles, tactics, and techniques from the ground up&#8212;how to rapidly experiment with design ideas, validate them with real users, and continually adjust your design based on what you learn.</p>

Software and Systems Traceability

by Orlena Gotel Jane Huang Andrea Zisman

Software and Systems Traceability provides a comprehensive description of the practices and theories of software traceability across all phases of the software development lifecycle. The term software traceability is derived from the concept of requirements traceability. Requirements traceability is the ability to track a requirement all the way from its origins to the downstream work products that implement that requirement in a software system. Software traceability is defined as the ability to relate the various types of software artefacts created during the development of software systems. Traceability relations can improve the quality of a product being developed, and reduce the time and cost of development. More specifically, traceability relations can support evolution of software systems, reuse of parts of a system by comparing components of new and existing systems, validation that a system meets its requirements, understanding of the rationale for certain design and implementation decisions, and analysis of the implications of changes in the system.

Guilty of Journalism: The Political Case against Julian Assange

by Kevin Gosztola

From an acclaimed independent journalist, this carefully-documented analysis of the government&’s case against Julian Assange and its implications for press freedom acts as a crucial, compelling guidebook to Assange&’s upcoming trial.The legal action against Julian Assange is poised to culminate in a trial in the United States in 2023, and this book will help the public understand the proceedings. The establishment media's coverage of WikiLeaks founder Julian Assange's extradition case has focused on his deteriorating health and what CBS News called his &“secret family,&” but most of this coverage failed to detail the complex issues at stake against Assange. Guilty of Journalism outlines how WikiLeaks exposed the reality of American wars, the United States government&’s unprecedented indictment against Assange as a publisher, and the media&’s role in persuading the public to &“shoot the messenger.&”This new book by Kevin Gosztola, who has spent the last decade covering Assange, WikiLeaks, and the wider war on whistleblowers, tells the full story based on testimony from dozens of witnesses. It examines abuses of power by the CIA and the FBI, including a spying operation that targeted Assange&’s family, lawyers, and doctors. Guilty of Journalism offers a balanced and comprehensive perspective on all the events leading up to what press freedom advocates have called the trial of the century.Guilty of Journalism is a joint production of The Censored Press and Seven Stories Press.

Refine Search

Showing 36,451 through 36,475 of 53,546 results