Résultats de recherche de titre
Articles 1 à 20 sur 4717
Early Modern Genres of History (Early Modern Themes)
Par Emil Nicklas Johnsen, Ina Louise Stovner. 2024
Bringing together an international group of literary scholars, intellectual historians, and cultural historians, this book discusses history in its various…
forms, either as texts or images in the early modern period (1500–1800).Early Modern Genres of History explores different genres and representational modes regarded as history before history became a scientific discipline during the nineteenth century. It does not seek to show how the modern discipline of history as an academic study developed, but rather to examine the ways in which historical texts and images became part of a wider field of early modern knowledge formations. This volume demonstrates how history was connected to the developments in the public sphere, how antiquarian historians used genres in their work, how history evolved and functioned in the visual field, and how historical genres travelled across different contexts. Overall, Early Modern Genres of History reveals how the diversity of historical representations in the early modern period has contributed to the broader foundations of history as it is understood in the twenty-first century.This volume is of great use to upper-level undergraduates, postgraduates, and scholars interested in early modern Europe and the history of knowledge across both the history and literature disciplines.Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures
Par Madhusudhan H. S., Satish Kumar T., Punit Gupta, Dinesh Kumar Saini, Kashif Zia. 2024
One of the major developments in the computing field has been cloud computing, which enables users to do complicated computations…
that local devices are unable to handle. The computing power and flexibility that have made the cloud so popular do not come without challenges. It is particularly challenging to decide which resources to use, even when they have the same configuration but different levels of performance because of the variable structure of the available resources. Cloud data centers can host millions of virtual machines, and where to locate these machines in the cloud is a difficult problem. Additionally, fulfilling optimization needs is a complex problem.Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures examines ways to meet these challenges. It discusses virtual machine placement techniques and task scheduling techniques that optimize resource utilization and minimize energy consumption of cloud data centers. Placement techniques presented can provide an optimal solution to the optimization problem using multiple objectives. The book focuses on basic design principles and analysis of virtual machine placement techniques and task allocation techniques. It also looks at virtual machine placement techniques that can improve quality-of-service (QoS) in service-oriented architecture (SOA) computing. The aims of virtual machine placement include minimizing energy usage, network traffic, economical cost, maximizing performance, and maximizing resource utilization. Other highlights of the book include: Improving QoS and resource efficiency Fault-tolerant and reliable resource optimization models A reactive fault tolerance method using checkpointing restart Cost and network-aware metaheuristics. Virtual machine scheduling and placement Electricity consumption in cloud data centers Written by leading experts and researchers, this book provides insights and techniques to those dedicated to improving cloud computing and its services.Wetland Diaries: Ranger Life and Rewilding on Wicken Fen
Par Ajay Tegala. 2024
Game Design Deep Dive: Soulslike
Par Joshua Bycer. 2024
Game Design Critic Joshua Bycer is back with another entry in the Game Design Deep Series to focus on the…
youngest genre yet: soulslikes. Over a decade, From Software defined a new genre that has led to studios chasing after them hit after hit. In this book, Josh will cover the history of the genre and popular soulslike games of the 2010s and discuss what aspects of design make a game a soulslike. The first book looking at the history of the genre A breakdown of both action and RPG design for fans and designers of both A lesson on difficulty in games and why harder doesn’t mean betterThe third volume in a new series exploring the basics of Raspberry Pi Operating System administration, this installment builds on…
the insights from Volumes 1 and 2 to provide a compendium of easy-to-use and essential guidance for Raspberry Pi system administration for novice users, with specific focus on Text Editors, git/ GitHub, and LXC/LXD.The overriding idea behind system administration of a modern, 21st-century Linux system, such as the Raspberry Pi OS, is the use of systemd to ensure that the Linux kernel works efficiently and effectively to provide these three foundation stones of computer operation and management: computer system concurrency, virtualization, and secure persistence. This third volume includes a beginner’s compendium of essential text-based Linux commands, a complete tutorial on the most important Raspberry Pi OS Text Editors, a description of uses of the git command, and a thorough explication of container virtualization with LXC/LXD and Docker.This book is aimed at students and practitioners looking to maximize their use of the Raspberry Pi OS. With plenty of practical examples, projects, and exercises, this volume can also be adopted in a more formal learning environment to supplement and extend the basic knowledge of a Linux operating system.The Zero Trust Framework and Privileged Access Management (PAM)
Par Ravindra Das. 2024
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business…
is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure.However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.Practical Web Accessibility: A Comprehensive Guide to Digital Inclusion
Par Ashley Firth. 2024
Everyone deserves to use the Internet. An estimated 1.3 billion people experience significant disability. That’s 16percent of the world’s population,…
or one in six of us. At the same time, over 96 percent of the one million most popular websites have an accessibility issue. Add to this the massive rise in legal cases around sites not being accessible, including Beyoncé, Disney, and Netflix, and you have an important topic that more and more people are starting to engage with.In this updated and revamped second edition of the Amazon technology chart-topping Practical Web Accessibility, you’ll be guided through a broad range of disabilities and access needs. You’ll understand the ways these users typically engage with the web, the barriers they often face, and practical advice on how your websites and content can be compliant, but more than that, inclusive and enjoyable to use. There’s also a new chapter on “Outsourcing Accessibility,” exploring third party “bolt-on” tools, “build your own website” platforms like Wix, and popular design systems. You‘ll explore whether they’re helpful or detrimental in the fight to make the web more accessible.Throughout this book you’ll learn to test for, spot, and fix web accessibility issues for a wide range of physical and mental impairments. Featuring content from the latest compliance frameworks, including the newly released WCAG 2.2 and exploratory concepts in WCAG 3, you’ll see how to go beyond the basic requirements in order to help your users. You’ll also learn that an accessible approach won’t just help people with disabilities, it will improve your website for everyone.This book comes complete with practical examples you can use in your own sites, along with a brand-new approach to auditing and improving a website’s accessibility, and a team’s approach to it, based on tools created by the author and refined over years as a consultant — The FAIR framework and ACCESS checklist. With these tools, you can set up processes for yourself and your team that will drastically improve the accessibility of your sites and, importantly, keep them that way in the future. Suitable for those of any profession or experience level, Practical Web Accessibility gives you all the information you need to ensure that your sites are truly accessible for the modern, inclusive web. If you would like to learn about web accessibility in a clear and actionable way, this book is for you.What You Will LearnA greater understanding of a vast range of disabilities that have online access needs, and the issues they typically face accessing content online.Ways to apply the practical steps required to cater for those needs.How to take your sites, and colleagues, on a journey from being inaccessible to accessible.The importance of accessibility in your designs, code, content, and more.The best ways to test andimprove your sites, so you can be compliant, and truly accessible. Who This Book Is For Anyone, regardless of what they do, who wants to learn how to make websites and their content more accessible for those with disabilities. In the world of web, the book has been used by front and backend developers, designers, product and project managers, team and business leaders.Data-Centric Business and Applications: Modern Trends in Financial and Innovation Data Processes 2023. Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #194)
Par Andriy Semenov, Iryna Yepifanova, Jana Kajanová. 2024
This book examines aspects of financial and investment processes, as well as the application of information technology mechanisms to business…
and industrial management, using the experience of the Ukrainian economy as an example. An effective tool for supporting business data processing is combining modern information technologies and the latest achievements in economic theory. The variety of industrial sectors studied supports the continuous acquisition and use of efficient business analysis in organizations. In addition, the book elaborates on multidisciplinary concepts, examples, and practices that can be useful for researching the evolution of developments in the field. Also, in this book, there is a description of analysis methods for making decisions in business, finance, and innovation management.Limits of AI - theoretical, practical, ethical (Technik im Fokus)
Par Klaus Mainzer, Reinhard Kahle. 2024
Artificial intelligence is a key technology with great expectations in science, industry, and everyday life. This book discusses both the…
perspectives and the limitations of this technology. This concerns the practical, theoretical, and conceptual challenges that AI has to face. In an early phase of symbolic AI, AI focused on formal programs (e.g., expert systems), in which rule-based knowledge was processed with the help of symbolic logic. Today, AI is dominated by statistics-based machine learning methods and Big Data. While this sub-symbolic AI is extremely successful (e.g., chatbots like ChatGPT), it is often not transparent. The book argues for explainable and reliable AI, in which the logical and mathematical foundations of AI-algorithms become understandable and verifiable.Art in the City, the City in Art (The Contemporary City)
Par Elisha Masemann. 2024
This Book examines an interplay between discourses on the city that stress the need for rational-functional order and art’s imaginative…
deviations from the topdown structures of urban life. Moving between theory and praxis, the book situates the city as both a concept and physical construct through which lives and possibilities are shaped or defined. In response, certain modalities of art create spontaneous, non-rational and playful interludes that risk escape from the urban apparatus and a hyper-valorisation of rational order. A three-part framework is used to discuss this push-pull dynamic and to assess the strategies of shock, performative embodiment and intervention that emerged in post-war art movements and in contemporary performance and participatory art practices. The book examines how the disturbances introduced by artists throw the city construct into sharp relief, making it visible and activating momentary encounters where new modes of expression can emerge. This Book offers a new approach to interdisciplinary studies of art and urbanity. The book aims to delineate how the city—as concept and construct—is made visible through artistic practice and in turn challenged or interrogated. Students, researchers and professionals with an interest in the interaction between art and urban studies will discover a new perspective on how urban conditions and issues have been addressed through artistic practice. The book contributes to an evolving discourse in the urban humanities through an exposition of the city’s default construct that is made visible or reimagined through visual art in public spaces.Studies in Silk Road Archaeology
Par Nai Xia. 2024
This book is a collection of Nai Xia’s quintessential works on Silk Road studies. A key resource in the field…
of Silk Road Archaeology, it features in-depth content, a broad range of material, careful textual research, and meticulous analysis. With thorough investigations of foreign coinage, silk textiles, and artifacts with foreign styles excavated in different parts of China, it explores the exchange between ancient China and Central Asia, Western Asia, and Europe. In particular, this book provides detailed descriptions of the economic and cultural ties between ancient China, Pre-Islamic Arabia, the Sasanian Empire, and the Byzantine Empire. The research propounds innovative theories on the history and evolution of East-West transportation routes, i.e., the overland Silk Road and the Maritime Silk Road. Based on the study of ancient relics and excavated artifacts, it points out that cultural exchange along the Silk Road was never unilateral, but instead, mutual influence and cooperation were obvious. Since ancient times, countries along the Silk Road have had a tradition of amicable foreign relations and the promotion of common interests. The book is intended for academics, scholars and researchers.Freeman's Challenge: The Murder That Shook America's Original Prison for Profit
Par Robin Bernstein. 2024
An award-winning historian tells a gripping, morally complicated story of murder, greed, race, and the true origins of prison for…
profit. In the early nineteenth century, as slavery gradually ended in the North, a village in New York State invented a new form of unfreedom: the profit-driven prison. Uniting incarceration and capitalism, the village of Auburn built a prison that enclosed industrial factories. There, “slaves of the state” were leased to private companies. The prisoners earned no wages, yet they manufactured furniture, animal harnesses, carpets, and combs, which consumers bought throughout the North. Then one young man challenged the system. In Freeman’s Challenge, Robin Bernstein tells the story of an Afro-Native teenager named William Freeman who was convicted of a horse theft he insisted he did not commit and sentenced to five years of hard labor in Auburn’s prison. Incensed at being forced to work without pay, Freeman demanded wages. His challenge triggered violence: first against him, then by him. Freeman committed a murder that terrified and bewildered white America. And white America struck back—with aftereffects that reverberate into our lives today in the persistent myth of inherent Black criminality. William Freeman’s unforgettable story reveals how the North invented prison for profit half a century before the Thirteenth Amendment outlawed slavery “except as a punishment for crime”—and how Frederick Douglass, Harriet Tubman, and other African Americans invented strategies of resilience and resistance in a city dominated by a citadel of unfreedom. Through one Black man, his family, and his city, Bernstein tells an explosive, moving story about the entangled origins of prison for profit and anti-Black racism.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part I (Communications in Computer and Information Science #2037)
Par Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part III (Communications in Computer and Information Science #2039)
Par Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Decision Support Systems XIV. Human-Centric Group Decision, Negotiation and Decision Support Systems for Societal Transitions: 10th International Conference on Decision Support System Technology, ICDSST 2024, Porto, Portugal, June 3–5, 2024, Proceedings
Par Sérgio Pedro Duarte, António Lobo, Boris Delibašić, Daouda Kamissoko. 2024
This book constitutes the proceedings of the 10th International Conference on Decision Support Systems Technologies, ICDSST 2024, held in June…
2024. The EWG-DSS series of International Conference on Decision Support System Technology (ICDSST) is planned to consolidate the tradition of annual events organized by the EWG-DSS in offering a platform for European and international DSS communities, comprising the academic and industrial sectors, to present state-of-the-art DSS research and developments, to discuss current challenges that surround decision-making processes, to exchange ideas about realistic and innovative solutions, and to co-develop potential business opportunities. This year the main topic was: Human-Centric Group Decision, Negotiation and Decision Support Systems for Societal Transitions. The 10 full papers included in these proceedings were carefully reviewed and selected from 29 submissions. They have been organized in topical sections as follows: Decision support tools and methods; and decision factors.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part II (Communications in Computer and Information Science #2038)
Par Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part IV (Communications in Computer and Information Science #2040)
Par Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory…
of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory…
of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.Drop Zone Borneo: Life and Times of an RAF Co-Pilot Far East, 1962-65
Par Roger Annett. 2006
In 1963 the Indonesian Army that threatened Borneo numbered 330,000 men, plus three thousand Commandos. Of these, six thousand were…
within 20 miles of the Borneo frontier. This grew to thirteen thousand in early 1965. From mid-way through 1964, British troops and their allies who were defending the border started to make offensive incursions into Indonesian Borneo—these operations were codenamed "Claret". Taken into account the confrontational nature of the campaign, casualties sustained in Borneo were surprisingly light. That in the whole of the Borneo campaign there were no fatalities among the RAF supply-dropping transports was extraordinary. The border area between the Indonesian and Malaysian parts of Borneo was one of the most inaccessible areas of mountainous jungle anywhere in the world—an entire army was kept supplied in the field for the complete campaign. This is the exciting account from a pilot who flew the dangerous flying missions and relates the tenseness and stresses of Jungle life in those dangerous days.