Browse Results

Showing 45,076 through 45,100 of 53,677 results

Search for Exotic Higgs Boson Decays to Merged Diphotons: A Novel CMS Analysis Using End-to-End Deep Learning (Springer Theses)

by Michael Andrews

This book describes the first application at CMS of deep learning algorithms trained directly on low-level, “raw” detector data, or so-called end-to-end physics reconstruction. Growing interest in searches for exotic new physics in the CMS collaboration at the Large Hadron Collider at CERN has highlighted the need for a new generation of particle reconstruction algorithms. For many exotic physics searches, sensitivity is constrained not by the ability to extract information from particle-level data but by inefficiencies in the reconstruction of the particle-level quantities themselves. The technique achieves a breakthrough in the reconstruction of highly merged photon pairs that are completely unresolved in the CMS detector. This newfound ability is used to perform the first direct search for exotic Higgs boson decays to a pair of hypothetical light scalar particles H→aa, each subsequently decaying to a pair of highly merged photons a→yy, an analysis once thought impossible to perform. The book concludes with an outlook on potential new exotic searches made accessible by this new reconstruction paradigm.

The Search for ExtraTerrestrial Intelligence: Proceedings of the 2nd SETI-INAF Meeting 2019 (Springer Proceedings in Physics #260)

by Stelio Montebugnoli Andrea Melis Nicolò Antonietti

This book presents the latest knowledge of the newly discovered Earth-like exoplanets and reviews improvements in both radio and optical SETI. A key aim is to stimulate fresh discussion on algorithms that will be of high value in this extremely complicated search. Exoplanets resembling Earth could well be able to sustain life and support the evolution of technological civilizations, but to date, all searches for such life forms have proved fruitless. The failings of SETI observations are well recognized, and a new search approach is necessary. In this book, different detection algorithms that exploit state-of-the-art, low-cost, and extremely fast multiprocessors are examined and compared. Novel methods such as the agnostic entropy and high-sensitivity blind signal extraction algorithms should represent a quantum leap forward in SETI. The book is of interest to all researchers in the field and hopefully stimulates significant progress in the search for extraterrestrial intelligence.

The Search for Supersymmetry in Hadronic Final States Using Boosted Object Reconstruction (Springer Theses)

by Giordon Stark

This thesis represents one of the most comprehensive and in-depth studies of the use of Lorentz-boosted hadronic final state systems in the search for signals of Supersymmetry conducted to date at the Large Hadron Collider. A thorough assessment is performed of the observables that provide enhanced sensitivity to new physics signals otherwise hidden under an enormous background of top quark pairs produced by Standard Model processes. This is complemented by an ingenious analysis optimization procedure that allowed for extending the reach of this analysis by hundreds of GeV in mass of these hypothetical new particles. Lastly, the combination of both deep, thoughtful physics analysis with the development of high-speed electronics for identifying and selecting these same objects is not only unique, but also revolutionary. The Global Feature Extraction system that the author played a critical role in bringing to fruition represents the first dedicated hardware device for selecting these Lorentz-boosted hadronic systems in real-time using state-of-the-art processing chips and embedded systems.

Search for tt̄H Production in the H → bb̅ Decay Channel: Using Deep Learning Techniques with the CMS Experiment (Springer Theses)

by Marcel Rieger

In 1964, a mechanism explaining the origin of particle masses was proposed by Robert Brout, François Englert, and Peter W. Higgs. 48 years later, in 2012, the so-called Higgs boson was discovered in proton-proton collisions recorded by experiments at the LHC. Since then, its ability to interact with quarks remained experimentally unconfirmed. This book presents a search for Higgs bosons produced in association with top quarks tt̄H in data recorded with the CMS detector in 2016. It focuses on Higgs boson decays into bottom quarks H → bb̅ and top quark pair decays involving at least one lepton. In this analysis, a multiclass classification approach using deep learning techniques was applied for the first time. In light of the dominant background contribution from tt̄ production, the developed method proved to achieve superior sensitivity with respect to existing techniques. In combination with searches in different decay channels, the presented work contributed to the first observations of tt̄H production and H → bb̅ decays.

Search Foundations: Toward a Science of Technology-Mediated Experience (History and Foundations of Information Science)

by Sachi Arafat Elham Ashoori

A call to redirect the intellectual focus of information retrieval and science (IR&S) toward the phenomenon of technology-mediated experience.In this book, Sachi Arafat and Elham Ashoori issue a call to reorient the intellectual focus of information retrieval and science (IR&S) away from search and related processes toward the more general phenomenon of technology-mediated experience. Technology-mediated experience accounts for an increasing proportion of human lived experience; the phenomenon of mediation gets at the heart of the human-machine relationship. Framing IR&S more broadly in this way generalizes its problems and perspectives, dovetailing them with those shared across disciplines dealing with socio-technical phenomena. This reorientation of IR&S requires imagining it as a new kind of science: a science of technology-mediated experience (STME). Arafat and Ashoori not only offer detailed analysis of the foundational concepts underlying IR&S and other technical disciplines but also boldly call for a radical, systematic appropriation of the sciences and humanities to create a better understanding of the human-technology relationship.Arafat and Ashoori discuss the notion of progress in IR&S and consider ideas of progress from the history and philosophy of science. They argue that progress in IR&S requires explicit linking between technical and nontechnical aspects of discourse. They develop a network of basic questions and present a discursive framework for addressing these questions. With this book, Arafat and Ashoori provide both a manifesto for the reimagining of their field and the foundations on which a reframed IR&S would rest.

Search Marketing: A Strategic Approach to SEO and SEM

by Kelly Cutler

Increase the power of your marketing budget and enhance customer reach with fundamental search marketing efforts, SEO and SEM. This comprehensive guide delves into the dynamic world of both paid and organic search marketing strategies, providing an in-depth understanding of the tactics and techniques that drive successful online visibility and business growth. As the digital marketing landscape continues to evolve, this work gets more technical, time-consuming and costly. Discover how to approach both paid and organic search marketing like a digital strategist by reading this book from digital marketing expert and educator, Kelly Cutler. Search Marketing offers insights into high-level fundamentals and advanced applications. Designed to help marketers and businesses leaders get more from this essential digital marketing tactic, the book dives into what marketers can do today to help their companies take a more controlled, intentional, and strategic approach to SEO and SEM. The book delivers techniques for increasing visibility, driving qualified traffic, measuring the success and functionality of SEO, SEM campaigns and advanced methods for campaign optimization. Readers will walk away knowing how to take a more informed approach to the business they bring from sites like Google and Bing, while gaining the insight necessary to effectively oversee search marketing at a strategic level.

Search Marketing Strategies

by James Colborn

Search Marketing Strategies focuses on how to make the most from the search engine industry. Concentrating on the strategic element rather than the procedural approach, the author demonstrates how to adapt the tactical techniques, such as paid search, site side optimization and analytics packages, into search strategies in order to achieve marketing or corporate objectives such as branding, sales and customer acquisition.

Search Methodologies

by Edmund K. Burke Graham Kendall

The first edition of Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques was originally put together to offer a basic introduction to the various search and optimization techniques that students might need to use during their research, and this new edition continues this tradition. Search Methodologies has been expanded and brought completely up to date, including new chapters covering scatter search, GRASP, and very large neighborhood search. The chapter authors are drawn from across Computer Science and Operations Research and include some of the world's leading authorities in their field. The book provides useful guidelines for implementing the methods and frameworks described and offers valuable tutorials to students and researchers in the field. "As I embarked on the pleasant journey of reading through the chapters of this book, I became convinced that this is one of the best sources of introductory material on the search methodologies topic to be found. The book's subtitle, "Introductory Tutorials in Optimization and Decision Support Techniques", aptly describes its aim, and the editors and contributors to this volume have achieved this aim with remarkable success. The chapters in this book are exemplary in giving useful guidelines for implementing the methods and frameworks described. " Fred Glover, Leeds School of Business, University of Colorado Boulder, USA "[The book] aims to present a series of well written tutorials by the leading experts in their fields. Moreover, it does this by covering practically the whole possible range of topics in the discipline. It enables students and practitioners to study and appreciate the beauty and the power of some of the computational search techniques that are able to effectively navigate through search spaces that are sometimes inconceivably large. I am convinced that this second edition will build on the success of the first edition and that it will prove to be just as popular. " Jacek Blazewicz, Institute of Computing Science, Poznan University of Technology and Institute of Bioorganic Chemistry, Polish Academy of Sciences

Search Patterns: Design for Discovery

by Peter Morville Jeffery Callender

What people are saying about Search Patterns "Search Patterns is a delight to read -- very thoughtful and thought provoking. It's the most comprehensive survey of designing effective search experiences I've seen." --Irene Au, Director of User Experience, Google "I love this book! Thanks to Peter and Jeffery, I now know that search (yes, boring old yucky who cares search) is one of the coolest ways around of looking at the world." --Dan Roam, author, The Back of the Napkin (Portfolio Hardcover) "Search Patterns is a playful guide to the practical concerns of search interface design. It contains a bonanza of screenshots and illustrations that capture the best of today's design practices and presents a fresh perspective on the broader role of search and discovery." --Marti Hearst, Professor, UC Berkeley and author, Search User Interfaces (Cambridge University Press) "It's not often I come across a book that asks profound questions about a fundamental human activity, and then proceeds to answer those questions with practical observations and suggestions. Search Patterns is an expedition into the heart of the web and human cognition, and for me it was a delightful journey that delivered scores of insights." --Dave Gray, Founder and Chairman, XPLANE "Search is swiftly transforming everything we know, yet people don't understand how mavens design search: by stacking breadcrumbs, scenting widgets, and keeping eyeballs on the engine. I urge you to put your eyeballs on this unique and important book." --Bruce Sterling, Writer, Futurist, and Co-Founder, The Electronic Frontier Foundation "As one who searches a lot (and often ends up frustrated), Search Patterns is a revelation." --Nigel Holmes, Designer, Theorist, and Principal, Explanation Graphics "Search Patterns is a fabulous must-have book! Inside, you'll learn the whys and wheres of practically every modern search design trick and technique." --Jared Spool, CEO and Founder, User Interface EngineeringSearch is among the most disruptive innovations of our time. It influences what we buy and where we go. It shapes how we learn and what we believe. In this provocative and inspiring book, you'll explore design patterns that apply across the categories of web, ecommerce, enterprise, desktop, mobile, social, and real-time search and discovery. Filled with colorful illustrations and examples, Search Patterns brings modern information retrieval to life, covering such diverse topics as relevance, faceted navigation, multi-touch, personalization, visualization, multi-sensory search, and augmented reality. By drawing on their own experience-as well as best practices and evidence-based research-the authors not only offer a practical guide to help you build effective search applications, they also challenge you to imagine the future of discovery. You'll find Search Patterns intriguing and invaluable, whether you're a web practitioner, mobile designer, search entrepreneur, or just interested in the topic. Discover a pattern language for search that embraces user psychology and behavior, information architecture, interaction design, and emerging technology Boost enterprise efficiency and e-commerce sales Enable mobile users to achieve goals, complete tasks, and find what they need Drive design innovation for search interfaces and applications

Search Techniques in Intelligent Classification Systems

by Andrey V. Savchenko

A unified methodology for categorizing various complexobjects is presented in this book. Through probability theory, novelasymptotically minimax criteria suitable for practical applications in imagingand data analysis are examined including the special cases such as theJensen-Shannon divergence and the probabilistic neural network. An optimalapproximate nearest neighbor search algorithm, which allows fasterclassification of databases is featured. Rough set theory, sequential analysisand granular computing are used to improve performance of the hierarchicalclassifiers. Practical examples in face identification (including deep neuralnetworks), isolated commands recognition in voice control system andclassification of visemes captured by the Kinect depth camera are included. This approach creates fast and accurate search procedures by using exactprobability densities of applied dissimilarity measures. Thisbook can be used as a guide for independent study and as supplementary materialfor a technically oriented graduate course in intelligent systems and datamining. Students and researchers interested in the theoretical and practicalaspects of intelligent classification systems will find answers to: - Why conventional implementation of the naive Bayesianapproach does not work well in image classification? - How to deal with insufficient performance of hierarchicalclassification systems? - Is it possible to prevent an exhaustive search of thenearest neighbor in a database?

Search Theory

by Leszek Gąsieniec V. S. Subrahmanian Steve Alpern Roy Lindelauf Robbert Fokkink

Search games and rendezvous problems have received growing attention in computer science within the past few years. Rendezvous problems emerge naturally, for instance, to optimize performance and convergence of mobile robots. This gives a new algorithmic point of view to the theory. Furthermore, modern topics such as the spreading of gossip or disease in social networks have lead to new challenging problems in search and rendezvous. Search Theory: A Game Theoretic Perspective introduces the first integrated approach to Search and Rendezvous from the perspectives of biologists, computer scientists and mathematicians. This contributed volume covers a wide range of topics including rendezvous problems and solutions, rendezvous on graphs, search games on biology, mobility in governed social networks, search and security, and more. Most chapters also include case studies or a survey, in addition to a chapter on the future direction of Search and Rendezvous research. This book targets researchers and practitioners working in computer science, mathematics and biology as a reference book. Advanced level students focused on these fields will also find this book valuable as a secondary text book or reference.

Search User Interfaces

by Marti A. Hearst

The truly world-wide reach of the Web has brought with it a new realisation of the enormous importance of usability and user interface design. In the last ten years, much has become understood about what works in search interfaces from a usability perspective, and what does not. Researchers and practitioners have developed a wide range of innovative interface ideas, but only the most broadly acceptable make their way into major web search engines. This book summarizes these developments, presenting the state of the art of search interface design, both in academic research and in deployment in commercial systems. Many books describe the algorithms behind search engines and information retrieval systems, but the unique focus of this book is specifically on the user interface. It will be welcomed by industry professionals who design systems that use search interfaces as well as graduate students and academic researchers who investigate information systems.

Searchable Encryption: From Concepts to Systems (Wireless Networks)

by Kui Ren Cong Wang

This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from searchable encryption constructions.The book fits in the timely context, where the necessity of safeguarding important and sensitive data has been globally recognized. Traditional security measures, such as storing data behind network firewalls and layers of access control mechanisms to keep attackers out, are no longer sufficient to cope with the expanding landscape of surging cyber threats. There is an urgent call to keep sensitive data always encrypted to protect the data at rest, in transit, and in use. Doing so guarantees data confidentiality for owners, even if the data is out of their hands, e.g., hosted at in-the-cloud databases. The daunting challenge is how to perform computation over encrypted data. As we unfold in this book, searchable encryption, as a specific line of research in this broadly defined area, has received tremendous advancements over the past decades.This book is majorly oriented toward senior undergraduates, graduate students, and researchers, who want to work in the field and need extensive coverage of encrypted database research. It also targets security practitioners who want to make well-informed deployment choices of the latest advancements in searchable encryption for their targeted applications. Hopefully, this book will be beneficial in both regards.

Searchable Storage in Cloud Computing

by Yu Hua Xue Liu

This book presents the state-of-the-art work in terms of searchable storage in cloud computing. It introduces and presents new schemes for exploring and exploiting the searchable storage via cost-efficient semantic hashing computation. Specifically, the contents in this book include basic hashing structures (Bloom filters, locality sensitive hashing, cuckoo hashing), semantic storage systems, and searchable namespace, which support multiple applications, such as cloud backups, exact and approximate queries and image analytics. Readers would be interested in the searchable techniques due to the ease of use and simplicity. More importantly, all these mentioned structures and techniques have been really implemented to support real-world applications, some of which offer open-source codes for public use. Readers will obtain solid backgrounds, new insights and implementation experiences with basic knowledge in data structure and computer systems.

Searching for High-Frequency Trading Opportunities (Wiley Global Finance Executive Select #153)

by Irene Aldridge

Praise for High-Frequency Trading "A well thought out, practical guide covering all aspects of high-frequency trading and of systematic trading in general. I recommend this book highly." -Igor Tulchinsky, CEO, WorldQuant, LLC "For traditional fundamental and technical analysts, Irene Aldridge's book has the effect a first read of quantum physics would have had on traditional Newtonian physicists: eye-opening, challenging, and enlightening." -Neal M. Epstein, CFA, Managing Director, Research & Product Management, Proctor Investment Managers LLC Interest in high-frequency trading continues to grow, yet little has been published to help investors understand and implement high-frequency trading systems-until now. This book has everything you need to gain a firm grip on how high-frequency trading works and what it takes to apply this approach to your trading endeavors. Written by industry expert Irene Aldridge, High-Frequency Trading offers innovative insights into this dynamic discipline. Covering all aspects of high-frequency trading-from the formulation of ideas and the development of trading systems to application of capital and subsequent performance evaluation-this reliable resource will put you in a better position to excel in today's turbulent markets.

Searching for Trust: Blockchain Technology in an Age of Disinformation

by Victoria L. Lemieux

Searching for Trust explores the intersection of trust, disinformation, and blockchain technology in an age of heightened institutional and epistemic mistrust. It adopts a unique archival theoretic lens to delve into how computational information processing has gradually supplanted traditional record keeping, putting at risk a centuries-old tradition of the 'moral defense of the record' and replacing it with a dominant ethos of information-processing efficiency. The author argues that focusing on information-processing efficiency over the defense of records against manipulation and corruption (the ancient task of the recordkeeper) has contributed to a diminution of the trustworthiness of information and a rise of disinformation, with attendant destabilization of the epistemic trust fabric of societies. Readers are asked to consider the potential and limitations of blockchains as the technological embodiment of the moral defense of the record and as means to restoring societal trust in an age of disinformation.

Searching Speech Databases: Features, Techniques and Evaluation Measures (SpringerBriefs in Speech Technology)

by Leena Mary Deekshitha G

This book presents techniques for audio search, aimed to retrieve information from massive speech databases by using audio query words. The authors examine different features, techniques and evaluation measures attempted by researchers around the world. The topics covered also include available databases, software / tools, patents / copyrights, and different platforms for benchmarking. The content is relevant for developers, academics, and students.​

Seasonal Sector Trades: 2014 Q2 Strategies

by Jeffrey A. Hirsch John L. Person

Commodity Trader's Almanac is now Seasonal Sector Trades! A precise seasonal investment strategy, backed by research and hard data Seasonal Sector Trades: 2014 Q2 Strategies is a comprehensive strategy calendar detailing the trades to evaluate at key points in April, May, and June, based on historic tendencies and cycles. Concise and to the point, this report alerts readers to major trade opportunities by describing monthly price tendencies for each market, along with in-depth analysis of major trades and the underlying market conditions. The trading ideas are accompanied by data that allows for informed trading decisions, and precise dates are given for trades with the highest historic profitability percentages. Virtually every market displays seasonal tendencies due to weather, harvest cycles, or even human behavior. None of these patterns are 100 percent accurate, but they do provide a framework for assessing opportunity and targeting potential trades. The culmination of years of painstaking research, Seasonal Sector Trades offers expert guidance backed by hard data. Readers will gain insight and actionable advice on the best trades of the season, covering stocks, bonds, currencies, energy, metals, grains, soft commodities, and meats. This report contains crucial information traders need to take advantage of seasonal trends, including features like: Historical tendencies for all markets throughout the calendar year Trades to monitor throughout each month Precise entry and exits for trades with the best performance Trading tips and strategies to maximize profits A complete seasonal investment strategy can take years to research and compile. Markets must be monitored and analyzed, and their behavior must be correlated with outside factors. Along the way, opportunities are missed and money is lost. This report contains the results of all that work in an already-complete format. With high-level analysis and specialist insight, Seasonal Sector Trades is the industry's most authoritative guide to the seasonal tendencies of every major market.

Seasonal Sector Trades: 2014 Q1 Strategies

by Jeffrey A. Hirsch John L. Person

Commodity Trader's Almanac is now Seasonal Sector Trades! Strategies identifying the best-performing seasonal trades for the first quarter of 2014 Seasonal tendencies and cycles provide a foundation for profitable trading. This edition of Seasonal Sector Trades contains trade ideas and strategies for the first quarter (Q1) of 2014. It identifies the best trades for each month based on historic tendencies and cycles. A special report is issued covering stocks, bonds, currencies, energy, metals, grains, soft commodities, and meats. Concise and to-the-point, the report describes monthly price tendencies for each market, alerting you to major trading opportunities. An accompanying strategy calendar shows you what to monitor during the beginning, middle, and end of each month. In addition to this information, daily exits and entries are provided for trades with the best historic performance. Backstopping the trade ideas are articles on the major trades of the month and in-depth analysis on the historic price patterns of the underlying market. The trading ideas and data allow you to compare current market conditions against historic tendencies and make informed trading decisions along the way. Includes in-depth analysis and data of the seasonal tendencies of all major financial and commodity markets Details trading tips and strategies to maximize profits from suggested trades Based on years of proven historical data The culmination of years of painstaking research, this quarterly guide will provide you with the historic knowledge to spot big trades unfolding in today's markets.

The Second Coming of Steve Jobs

by Alan Deutschman

From the acclaimed Vanity Fair and GQ journalist--an unprecedented, in-depth portrait of the man whose return to Apple precipitated one of the biggest turnarounds in business history. From the emergence of Apple Computer in the late 1970s and early 1980s to its current resurgence, charismatic leader Steve Jobs has captivated the public. Both revered and reviled for his dictatorial manner and stunning successes, Jobs has transcended his legend in Silicon Valley to take on some of the heaviest hitters in Hollywood. Now, in The Second Coming of Steve Jobs, Alan Deutschman presents the most revealing portrait yet of this fascinating, complex character--an in-depth look at the many layers of Steve Jobs, a man who is at turns a brilliant cult figure and an abusive, egomaniacal kid. This story begins back in 1985 when Jobs was exiled from Apple, and then it goes on to chronicle the rise and fall of his own company, NeXT; the enormous success of Jobs's film animation studio, Pixar; and finally his triumphant return to Apple in the late 1990s, with Jobs taking the title of CEO in January 2000. Displaying an uncanny skill at the negotiation table and an intuitive sense of brilliant design that could capture the public's fascination with products like the iMac, along with a celebrity's ability to command the spotlight, Jobs has been able to catapult himself to the top of the Silicon Valley and Hollywood establishments. Based on interviews with scores of people--rivals, colleagues, friends--who have worked with Jobs over the years, The Second Coming of Steve Jobs gets under the hood of this extraordinarily complex man: how and why he almost gave up on his career; the details of his negotiations with Disney's Jeffrey Katzenberg and Michael Eisner, and of the culture clash between Silicon Valley and Hollywood; his methods of leadership, management, creativity, and innovation; his friendship and rivalry with Bill Gates--and much more. In an unsentimental and powerful voice, Deutschman reveals a man who suffered his midlife crisis at thirty, compressing it into just three months; struggled between self-imposed exile and the allure of public life; and became the baby boomer icon who was constantly blurring the lines between businessman, rock star, and beatnik. The Second Coming of Steve Jobs is a compelling look at an individual who has changed the face of technology and entertainment for the twenty-first century. This candid account of Steve Jobs's tumultuous and provocative career will answer the many questions left unanswered by this incredibly private character who has come to represent the Silicon Valley American dream.

The Second Economy

by Steve Grobman Allison Cerra

Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment. In today's hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy - the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors. Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary - one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete. The Second Economy highlights a second to none approach in this fight, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable. What You Will Learn: Understand the value of time and trust in a cyber-warfare world Enable agile and intelligent organizations to minimize their risk of falling victim to the next attack Accelerate response time by adopting a holistic approach Eliminate friction across the threat defense lifecycle, from protection to detection to correction Gain a sustainable competitive advantage by seizing first mover advantage Deploy solutions across an open, integrated security framework Who This Book Is For: Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war.

Second Generation Biometrics: The Ethical, Legal and Social Context

by Dimitros Tzovaras Emilio Mordini

While a sharp debate is emerging about whether conventional biometric technology offers society any significant advantages over other forms of identification, and whether it constitutes a threat to privacy, technology is rapidly progressing. Politicians and the public are still discussing fingerprinting and iris scan, while scientists and engineers are already testing futuristic solutions. Second generation biometrics - which include multimodal biometrics, behavioural biometrics, dynamic face recognition, EEG and ECG biometrics, remote iris recognition, and other, still more astonishing, applications - is a reality which promises to overturn any current ethical standard about human identification. Robots which recognise their masters, CCTV which detects intentions, voice responders which analyse emotions: these are only a few applications in progress to be developed. This book is the first ever published on ethical, social and privacy implications of second generation biometrics. Authors include both distinguished scientists in the biometric field and prominent ethical, privacy and social scholars. This makes this book an invaluable tool for policy makers, technologists, social scientists, privacy authorities involved in biometric policy setting. Moreover it is a precious instrument to update scholars from different disciplines who are interested in biometrics and its wider social, ethical and political implications.

Second Handbook of Information Technology in Primary and Secondary Education

by Joke Voogt Gerald Knezek Rhonda Christensen Kwok-Wing Lai

In this second edition the editors continue their efforts to synthesize research and practice and project future directions in the field of information and communication technology. The proliferation of mobile devices and applications have had major implications on how the nature of teaching and learning should be conceptualised, and what pedagogical practices should be used to support bridging formal and informal learning. The advent of social media also highlights the importance of gaining a deeper understanding of social learning theories and computer-supported collaborative learning theories and practices. The advancement of new technologies to support easy accessibility of educational resources such as OER and to a lesser extent MOOCs have led to the debate on how assessment should be conducted and how technologies could be used to support it. The demand of the knowledge society requires that researchers, policy makers, and educational practitioners be conversant with new research findings in order to understand the impact of ICT in teaching and learning, and how to support learners to use new technologies and applications creatively and effectively. New research paradigms have emerged to meet these challenges.

The Second Impeachment Report: Materials in Support of H. Res. 24, Impeaching Donald John Trump, President of the United States, for High Crimes and Misdemeanors

by Majority Staff Committee on the Judiciary

With a foreword by New York Times bestselling author and former confidante of Donald J. Trump, Michael Cohen, the official report of materials supporting the first-ever second impeachment of a President of the United States—complete with US Constitution included. In 2019, Donald Trump became only the third US President to be impeached by the House of Representatives on charges of abuse of power and obstruction of congress. In January 2021, he became the first President in American history to be impeached for a second time. Though no sitting president was ever convicted, will Trump be the first there, too? Still in the midst of the coronavirus pandemic, which the president has also been accused of handling poorly, and an ongoing refusal to concede his loss to rival candidate Joe Biden, Donald Trump is said to have provoked his followers to storm the US Capitol in Washington, DC, resulting in a shocking protest-turned-violent in an effort to stop the official Electoral count in certifying Biden's victory. The unprecedented event led to the deaths of at least five people, as well as the President being banned from all major social media, including Twitter, Facebook, Instagram, and more, due to risk of inciting more violence. This groundbreaking report—released by the House Judiciary Committee, chaired by Jerrold Nadler—covers Trump's conduct leading up to January 6, 2021, the attack on the capitol, his response to the insurrection, and provides a compelling argument as to why there is an immediate need to consider impeachment despite Trump having only seven days left in office.

The Second International Adaptive and Sustainable Science, Engineering and Technology Conference: ASSET 2023 Proceedings (Signals and Communication Technology)

by Sunday Cookey Ekpo

This proceedings presents papers from the Second International Adaptive and Sustainable Science, Engineering and Technology Conference (ASSET 2023), which took place simultaneously in Manchester, UK and Ikot Akpaden, Nigeria on 18-20, July 2023. The ASSET conference serves as an interactive forum for the advancement of the practice of adaptive and sustainable systems across the multiple disciplines and specialty areas involved with the science, engineering, and technology of integrated entities, complex systems, and networks. The conference provides an avenue for practitioners, researchers, managers, developers, analysts, educators, and users to exchange innovative ideas, concepts, applications, and lessons learned in addressing domain-specific problems, applications-oriented topics, methodologies, standards and multidisciplinary research opportunities and findings relating to ASSET systems.

Refine Search

Showing 45,076 through 45,100 of 53,677 results