Résultats de recherche de titre
Articles 1 à 20 sur 2813
Eddie Olczyk: Beating the Odds in Hockey and in Life
Par Eddie Olczyk, Perry Lefko. 2019
Eddie Olczyk had built a life and career most people could only dream of. Growing up in the suburbs of…
Chicago, he fell in love with the game of hockey during an era when most kids preferred balls to pucks. Against all odds, he played on the 1984 U.S. Olympic hockey team as a 17-year-old, and four months later he was drafted in the first round by his hometown Chicago Blackhawks. During an illustrious 16-year career, he played for and alongside some of the greatest franchises and players in history, winning a Stanley Cup with the unforgettable 1994 New York Rangers. Years later, he coached former teammate Mario Lemieux and Sidney Crosby on the Pittsburgh Penguins before transitioning into the broadcast booth, where he has become one of the most recognizable voices of the sport. He then combined his skills as an analyst with his second passion— horse racing—and became an integral part of NBC’s coverage of thoroughbreds. Away from the spotlight, Olczyk and his wife of three decades raised four adoring children. He was respected and admired by fans, friends, and peers. Life was sweet. Then, at 7:07 pm on August 4, 2017, his entire world turned upside down. In Eddie Olczyk: Beating the Odds in Hockey and in Life, one of the biggest names in American hockey has written an inspiring and entertaining memoir of his life both on and off the ice. From shooting hundreds of tennis balls at a goal in his childhood living room to the ups and downs of his improbable hockey career to rollicking stories from the booth and the backstretch, Olczyk guides readers on his journey toward his ultimate test: a battle against Stage 3 colon cancer. For years, Olczyk’s goal was to be the best husband, father, broadcaster, and handicapper he could be. Today he has a new one: to bring as much awareness and support to those fighting cancer as he possibly can. In this emotional but often hilarious autobiography, you’ll learn why the people who know Eddie Olczyk best might describe him as “tremendously tremendous.”Come, Read With Me
Par Margriet Ruurs, Christine Wei. 2021
Production note: This title was created through eBOUND's Literary Image Description project. The author and illustrator wrote or consulted on…
the image descriptions, which are included in the body and narration of the text. In this picture book about stories and reading, contemporary children are whisked through an imaginary world while interacting with characters from classic fairy tales.Blockchain-based Internet of Things: Opportunities, Challenges and Solutions
Par Iraq Ahmad Reshi, Sahil Sholla. 2024
This book presents an overview of the blockchain-based Internet of Things systems, along with the opportunities, challenges, and solutions in…
diverse fields such as business, education, agriculture, and healthcare. It discusses scalability, security, layers, threats, and countermeasures in blockchain-based Internet of Things network.· Elaborates on the opportunities presented by combining blockchain with artificial intelligence on the Internet of Things systems in the management of food systems, and drug supply chains.· Explains the management of computationally intensive tasks in blockchain-based Internet of Things through the development of lightweight protocols.· Presents various applications in fields including logistics and the supply chain, automobile industry, smart housing, shared economy, and agriculture.· Provides insights into blockchain-based Internet of Things systems, along with their features, vulnerabilities, and architectural flaws.· The text is primarily written for graduate students, and academic researchers working in the fields of computer science and engineering, electrical engineering, and information technology.This book constitutes revised papers from the International Workshops held at the 21st International Conference on Business Process Management, BPM…
2023, in Utrecht, The Netherlands, during September 2023.Papers from the following workshops are included:• 7th International Workshop on Artificial Intelligence for Business Process Management (AI4BPM 2023)• 7th International Workshop on Business Processes Meet Internet-of-Things (BP-Meet-IoT 2023)• 19th International Workshop on Business Process Intelligence (BPI 2023)• 16th International Workshop on Social and Human Aspects of Business Process Management (BPMS2 2023)• 2nd International Workshop on Data-Driven Business Process Optimization (BPO 2023)• 11th International Workshop on Declarative, Decision and Hybrid Approaches to Processes (DEC2H 2023)• 1st International Workshop on Digital Twins for Business Processes (DT4BP 2023)• 1st International Workshop on Formal Methods for Business Process Management (FM-BPM 2023) • 2nd International Workshop on Natural Language Processing for Business Process Management (NLP4BPM 2023)• 1st International Workshop on Object-Centric Processes from A to Z (OBJECTS 2023)• 3rd International Workshop on Change, Drift, and Dynamics of Organizational Processes (ProDy 2023) Each of the workshops focused on particular aspects of business process management. Overall, after a thorough review process, 42 full papers were selected from a total of 86 submissions.Transactions on Intelligent Welding Manufacturing: Volume V No. 1 2021 (Transactions on Intelligent Welding Manufacturing)
Par Shanben Chen, Yuming Zhang, Zhili Feng. 2024
The primary aim of this book is to provide researchers and engineers from both academic and industry with up-to-date coverage…
of new results in the field of robotic welding, intelligent systems and automation. The book is mainly based on papers selected from the 2022 International Conference on Robotic Welding, Intelligence and Automation (RWIA’2022) in Shanghai and Lanzhou, China. The articles show that the intelligentized welding manufacturing (IWM) is becoming an inevitable trend with the intelligentized robotic welding as the key technology. The volume is divided into four logical parts: Intelligent Techniques for Robotic Welding, Sensing of Arc Welding Processing, Modeling and Intelligent Control of Welding Processing, as well as Intelligent Control and its Applications in Engineering.Edge Intelligent Computing Systems in Different Domains (SpringerBriefs in Computer Science)
Par Benedetta Picano, Romano Fantacci. 2024
This book provides a comprehensive and systematic exploration of next-generation Edge Intelligence (EI) Networks. It delves deep into the critical…
design considerations within this context, emphasizing the necessity for functional and dependable interactions between networking strategies and the diverse application scenarios. This should help assist to encompass a wide range of environments.This book also discusses topics such as resource optimization, incentive mechanisms, channel prediction and cutting-edge technologies, which includes digital twins and advanced machine learning techniques. It underscores the importance of functional integration to facilitate meaningful collaborations between networks and systems, while operating across heterogeneous environments aiming support novel and disruptive human-oriented services and applications. Valuable insights into the stringent requirements for intelligence capabilities, communication latency and real-time response are discussed. This characterizes the new EI era, driving the creation of comprehensive cross-domain architectural ecosystems that infuse human-like intelligence into every aspect of emerging EI systems.This book primarily targets advanced-level students as well as postdoctoral researchers, who are new to this field and are searching for a comprehensive understanding of emerging EI systems. Practitioners seeking guidance in the development and implementation of EI systems in practical contexts will also benefit from this book.Development and Testing of Vehicle Software and its Influence on Sustainable Transport
Par Antonio Colmenar-Santos, David Borge-Diez, Pedro-Miguel Ortega-Cabezas. 2024
This book evaluates the contributions of the electronic control unit software of an electric vehicle on sustainability and society, such…
as the reduction of emissions during a product design and the improvements in the vehicle. A sustainable transport model is proposed, demonstrating its economic viability. By validating software in a more efficient way and adding new functionalities to the software to enhance driving efficiency, energy consumption can be significantly reduced. Therefore, software validation and development have a significant impact on sustainability. This book offers innovative validation solutions based on artificial intelligence techniques to reduce validation time and emissions. The impact of driving efficiency on sustainable transport models is studied in detail, making proposals to be considered in the current environmental policies under discussion within the European Union in order to improve the sustainability of transport models. Vehicles are becoming sophisticated electronic systems due to the fact that they are integrating a significant number of electronic control units. This trend will certainly continue in the year to come. Consequently, software validation techniques are a key element for car manufacturers in order to ensure the quality of the vehicle. This book contributes to these efforts.Statistics and Data Analysis for Engineers and Scientists (Transactions on Computer Systems and Networks)
Par Tanvir Mustafy, Md. Tauhid Rahman. 2024
This textbook summarizes the different statistical, scientific, and financial data analysis methods for users ranging from a high school level…
to a professional level. It aims to combine the data analysis methods using three different programs—Microsoft Excel, SPSS, and MATLAB. The book combining the different data analysis tools is a unique approach. The book presents a variety of real-life problems in data analysis and machine learning, delivering the best solution. Analysis methods presented in this book include but are not limited to, performing various algebraic and trigonometric operations, regression modeling, and correlation, as well as plotting graphs and charts to represent the results. Fundamental concepts of applied statistics are also explained here, with illustrative examples. Thus, this book presents a pioneering solution to help a wide range of students, researchers, and professionals learn data processing, interpret different findings derived from the analyses, and apply them to their research or professional fields. The book also includes worked examples of practical problems. The primary focus behind designing these examples is understanding the concepts of data analysis and how it can solve problems. The chapters include practice exercises to assist users in enhancing their skills to execute statistical analysis calculations using software instead of relying on tables for probabilities and percentiles in the present world.The two-volume set LNCS 14461 and LNCS 14462 constitutes the refereed proceedings of the 17th International Conference on Combinatorial Optimization and Applications, COCOA 2023, held…
in Hawaii, HI, USA, during December 15–17, 2023. The 73 full papers included in the proceedings were carefully reviewed and selected from 117 submissions. They were organized in topical sections as follows: Part I: Optimization in graphs; scheduling; set-related optimization; applied optimization and algorithm; Graph planer and others;Part II: Modeling and algorithms; complexity and approximation; combinatorics and computing; optimization and algorithms; extreme graph and others; machine learning, blockchain and others.The two-volume set LNCS 14461 and LNCS 14462 constitutes the refereed proceedings of the 17th International Conference on Combinatorial Optimization and Applications, COCOA 2023, held…
in Hawaii, HI, USA, during December 15–17, 2023. The 73 full papers included in the proceedings were carefully reviewed and selected from 117 submissions. They were organized in topical sections as follows: Part I: Optimization in graphs; scheduling; set-related optimization; applied optimization and algorithm; Graph planer and others;Part II: Modeling and algorithms; complexity and approximation; combinatorics and computing; optimization and algorithms; extreme graph and others; machine learning, blockchain and others.Take Control of the Mac Command Line with Terminal
Par Joe Kissell. 2022
Release your inner geek and harness the power of the Unix underpinnings to Mac OS X! This ebook from Joe…
Kissell explains everything you need to know to become comfortable working on the command line in Terminal, and provides numerous "recipes" for performing useful tasks.Disrupting the School-to-Prison Pipeline (HER Reprint Series)
Par SofÍa Bahena. 2012
A trenchant and wide-ranging look at this alarming national trend, Disrupting the School-to-Prison Pipeline is unsparing in its account of…
the problem while pointing in the direction of meaningful and much-needed reforms.The &“school-to-prison pipeline&” has received much attention in the education world over the past few years. A fast-growing and disturbing development, it describes a range of circumstances whereby &“children are funneled out of public schools and into the juvenile and criminal justice systems.&” Scholars, educators, parents, students, and organizers across the country have pointed to this shocking trend, insisting that it be identified and understood—and that it be addressed as an urgent matter by the larger community.This new volume from the Harvard Educational Review features essays from scholars, educators, students, and community activists who are working to disrupt, reverse, and redirect the pipeline. Alongside these authors are contributions from the people most affected: youth and adults who have been incarcerated, or whose lives have been shaped by the school-to-prison pipeline. Through stories, essays, and poems, these individuals add to the book&’s comprehensive portrait of how our education and justice systems function—and how they fail to serve the interests of many young people."Crime and Nature
Par Marcus Felson. 2006
Crime and Nature, written by the always innovative and original Marcus Felson, is the first text to provide students with…
a unique, new perspective for thinking about crime and how modern society can reduce crime′s ecosystem and limit its diversity. Key FeaturesConnects crime to its larger world: This innovative book shows how crime draws from the larger ecosystem, that is, how offenders hunt for targets and how they depend on one another. Extending crime ecology well beyond other works, this book shows how to help shut off crime opportunities and reduce crime in local areas. An examination of how people defend against crime is also provided. Stimulates critical thinking about crime: Crime feeds off of legal activities, both shady and legitimate. Through a wealth of examples, ranging from racketeering to juvenile street gangs, this book shows criminology students what to look for and how to sort it out. The author uses recent empirical studies to validate the principles presented and draws from a wealth of experience in other fields, always keeping an eye on what every criminologist needs to know. Presents intriguing, useful information in an engaging and unique style: Writing in a warm and personal voice, the author uses an engaging, student-friendly style to build a sophisticated view of crime in small, sure steps. Down-to-earth ideas and examples are presented through concise exhibits. Intended AudienceThis is an excellent supplementary text for a variety of undergraduate courses in criminology and criminal justice, including Criminological Theory, Crime Control and Prevention, Introduction to Criminology, Law and Society, and Social Problems. It will have a lasting impact on present and future criminologists.Profiling Violent Crimes: An Investigative Tool
Par Ronald M. Holmes, Stephen T. Holmes. 2009
"Excellent book, I have used this for my Criminal Behavior course for a number of years. Very authoritative."—Harry Cramer, Quincy UniversityThe…
Fourth Edition of this best-selling text provides students with the most up-to-date information on the increasingly popular field of psychological profiling. Well-known authors Ronald M. Holmes and Stephen T. Holmes build upon their continued research and involvement in field investigation as a source of relevant and often high-profile case studies to illustrate theory and application of the methods discussed. The text is particularly readable and engaging, making frequent use of illustrative tables and figures and presenting occasional photos. New to the Fourth EditionOffers a new chapter on Lizzie Borden (Chapter 14), analyzing this historic murder case with fresh insight and a unique analysis while retaining the chapter on Jack the Ripper, a classic unresolved serial murdererCovers more recent events such as the killings at Northern Illinois University and Virginia TechProvides a new section on Santeria and the occult to understand the dogma and icons of these teachings and investigates reasons behind crimes committed by some followersOffers guidance to students for online graduate programs, seminars, and degrees in criminal profilingIncludes updated tables and crime statistics throughout the textPresents new photos to offer authentic representations of violent crimes and offendersIntended AudienceThis best-seller has long been a successful supplemental text for undergraduate criminology and criminal justice courses, including Criminal Investigation, Criminal Profiling, Violent Crimes, Criminal Behavior, Field Investigation, and Forensic Psychology.Ironies of Imprisonment: Social Control And The Ironies Of Imprisonment
Par Michael Welch. 2005
From the Foreword "Michael Welch′s book is an invitation to think. It is an invitation to grow intellectually and critically,…
as a consumer of crime policy and an observer of the American scene. Written by a scholar who has dedicated his work to uncovering the hidden ironies of formal crime policy, this is a collection of essays of depth and significance." -Todd R. Clear, Distinguished Professor, John Jay College of Criminal Justice Praise for Ironies of Imprisonment:"The American correctional system is too often misshaped by a toxic mixture of ideology, anti-intellectualism, wishful thinking, and structural interests. Michael Welch uses his substantial critical skills to illuminate how these various factors intersect to create policies and practices that produce, in the end, more injustice and less public safety. His sobering analysis deconstructs the rhetoric used to justify mass imprisonment and its unanticipated, disquieting consequences."-Frank Cullen, University of Cincinnati "Michael Welch has written a book which anyone who is looking for an alternative to conventional and conservative approaches to prisons and punishment should read. Welch provides the groundwork for the development of a penology which engages critically with the growing tensions and ironies of imprisonment." -Roger Matthews, Middlesex University Ironies of Imprisonment examines in-depth an array of problems confronting correctional programs and policies from the author′s singular and consistent critical viewpoint. The book challenges the prevailing logic of mass incarceration and traces the ironies of imprisonment to their root causes, manifesting in social, political, economic, and racial inequality. Key Features A compelling Foreword written by Todd E. Clear, an internationally recognized leader in the field of criminal justice. Chapters open with illuminating real-life vignettes and end with provocative review questions. The author′s knowledgeable and dynamic voice provides a consistent perspective on key issues such as the war on drugs, the war on terror, prison violence, capital punishment, health care, and the prison industry. Up-to-date presentation of pertinent subject matter, including chief developments in research and theory. Discussion of the problems facing corrections in a post-September 11th world. Unique and accessible, this book promises to stimulate spirited discussion and debate over the use of prisons. Ironies of Imprisonment is recommended reading for students in corrections classes at the undergraduate and graduate levels in sociology, criminology, and criminal justice departments. In addition, it can be used in conjunction with a core text in courses on policy, theories of punishment, and social problems. The book will also be of interest to a general audience interested in reading about incarceration. Michael Welch is the author of numerous articles and several books on the subject of punishment and social control, including Punishment in America (1999), Flag Burning: Moral Panic and the Criminalization of Protest (2000), and Detained: Immigration Laws and the Expanding I.N.S. Jail Complex (2002). He has correctional experience at the federal, state, and local levels. Welch received a Ph.D. in sociology from the University of North Texas, Denton and is Associate Professor of Criminal Justice at Rutgers University.Conversational Artificial Intelligence
Par Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Piyush Vyas, Mary Sowjanya Alamanda, Kotagiri Srividya, Krishnan Sakthidasan Sankaran. 2024
Conversational AI combines natural language processing (NLP) with traditional software like chatbots, voice assistants, or an interactive voice recognition system…
to help customers through either a spoken or typed interface. Conversational chatbots that respond to questions promptly and accurately to help customers are a fascinating development since they make the customer service industry somewhat self-sufficient. A well-automated chatbot can decimate staffing needs, but creating one is a time-consuming process. Voice recognition technologies are becoming more critical as AI assistants like Alexa become more popular. Chatbots in the corporate world have advanced technical connections with clients thanks to improvements in artificial intelligence. However, these chatbots’ increased access to sensitive information has raised serious security concerns. Threats are one-time events such as malware and DDOS (Distributed Denial of Service) assaults. Targeted strikes on companies are familiar and frequently lock workers out. User privacy violations are becoming more common, emphasizing the dangers of employing chatbots. Vulnerabilities are systemic problems that enable thieves to break in. Vulnerabilities allow threats to enter the system, hence they are inextricably linked. Malicious chatbots are widely used to spam and advertise in chat rooms by imitating human behavior and discussions, or to trick individuals into disclosing personal information like bank account details.AI for Radiology (AI for Everything)
Par Oge Marques. 2024
Artificial intelligence (AI) has revolutionized many areas of medicine and is increasingly being embraced. This book focuses on the integral…
role of AI in radiology, shedding light on how this technology can enhance patient care and streamline professional workflows. This book reviews, explains, and contextualizes some of the most current, practical, and relevant developments in artificial intelligence and deep learning in radiology and medical image analysis. AI for Radiology presents a balanced viewpoint of the impact of AI in these fields, underscoring that AI technologies are not intended to replace radiologists but rather to augment their capabilities, freeing professionals to focus on more complex cases. This book guides readers from the basic principles of AI to their practical applications in radiology, moving from the role of data in AI to the ethical and regulatory considerations of using AI in radiology and concluding with a selection of resources for further exploration. This book has been crafted with a diverse readership in mind. It is a valuable asset for medical professionals eager to stay up to date with AI developments, computer scientists curious about AI’s clinical applications, and anyone interested in the intersection of healthcare and technology.Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science #14344)
Par Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis. 2024
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS…
2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.This two-volume set LNCS 14465-14466 constitutes the proceedings of the 31st International Symposium on Graph Drawing and Network Visualization, GD…
2023, held in Isola delle Femmine, Palermo, Italy, in September 2023. The 31 full papers, 7 short papers, presented together with 2 invited talks, and one contest report, were thoroughly reviewed and selected from the 100 submissions. The abstracts of 11 posters presented at the conference can be found in the back matter of the volume. The contributions were organized in topical sections as follows: beyond planarity; crossing numbers; linear layouts; geometric aspects; visualization challenges; graph representations; graph decompositions; topological aspects; parameterized complexity for drawings; planar graphs; frameworks; algorithmics.Pen Testing from Contract to Report
Par Alfred Basta, Nadine Basta, Waqar Anwar. 2024
Pen Testing from Contractto Report Protect your system or web application with this accessible guide Penetration tests, also known as…
‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications. Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions. In Pen Testing from Contract to Report readers will also find: Content mapped to certification exams such as the CompTIA PenTest+Detailed techniques for evading intrusion detection systems, firewalls, honeypots, and moreAccompanying software designed to enable the reader to practice the concepts outlined, as well as end-of-chapter questions and case studies Pen Testing from Contract to Report is ideal for any cyber security professional or advanced student of cyber security.