Résultats de recherche de titre
Articles 1 à 20 sur 3031
Gendered Islamophobia: My Journey With a Scar(f)
Par Monia Mazigh. 2023
This passionate book describes the author's struggles against Islamophobia as it applies to women, especially those wearing hijab, who consistently…
get stereotyped as silent and compliant women dominated by their men.The Utility of Boredom: Baseball Essays
Par Andrew Forbes. 2016
Spitball literary essays on the off-kilter joys, sorrows and wonder of North America’s national pastime. A collection of essays for…
ardent seamheads and casual baseball fans alike, The Utility of Boredom is a book about finding respite and comfort in the order, traditions, and rituals of baseball. It’s a sport that shows us what a human being might be capable of, with extreme dedication—whether we’re eating hot dogs in the stands, waiting out a rain delay in our living rooms, or practising the lost art of catching a stray radio signal from an out-of-market broadcast. From learning about America through ball-diamond visits to the most famous triple play that never happened on Canadian soil, Forbes invites us to witness the adult conversing with the O-Pee-Chee baseball cards of his youth. Tender, insightful, and with the slow heartbreak familiar to anyone who’s cheered on a losing team, The Utility of Boredom tells us a thing or two about the sport, and how a seemingly trivial game might help us make sense of our messy lives.Pride and Persistence: Stories of Queer Activism (Do You Know My Name? #4)
Par Mary Fairhurst Breen. 2023
The activists between these pages have stood up for the queer community, whether on their own behalf or in support…
of people they love. Some made a difference by confronting injustice; others dared to be fully themselves.Beryl: The Making of a Disability Activist
Par Dustin Galer. 2023
The story of a mid-century working-class housewife whose extraordinary physical transformation empowered her to become a dynamic social activist who…
fueled a movement to create a more inclusive future for people with disabilities.This book constitutes revised papers from the International Workshops held at the 21st International Conference on Business Process Management, BPM…
2023, in Utrecht, The Netherlands, during September 2023.Papers from the following workshops are included:• 7th International Workshop on Artificial Intelligence for Business Process Management (AI4BPM 2023)• 7th International Workshop on Business Processes Meet Internet-of-Things (BP-Meet-IoT 2023)• 19th International Workshop on Business Process Intelligence (BPI 2023)• 16th International Workshop on Social and Human Aspects of Business Process Management (BPMS2 2023)• 2nd International Workshop on Data-Driven Business Process Optimization (BPO 2023)• 11th International Workshop on Declarative, Decision and Hybrid Approaches to Processes (DEC2H 2023)• 1st International Workshop on Digital Twins for Business Processes (DT4BP 2023)• 1st International Workshop on Formal Methods for Business Process Management (FM-BPM 2023) • 2nd International Workshop on Natural Language Processing for Business Process Management (NLP4BPM 2023)• 1st International Workshop on Object-Centric Processes from A to Z (OBJECTS 2023)• 3rd International Workshop on Change, Drift, and Dynamics of Organizational Processes (ProDy 2023) Each of the workshops focused on particular aspects of business process management. Overall, after a thorough review process, 42 full papers were selected from a total of 86 submissions.Transactions on Intelligent Welding Manufacturing: Volume V No. 1 2021 (Transactions on Intelligent Welding Manufacturing)
Par Shanben Chen, Yuming Zhang, Zhili Feng. 2024
The primary aim of this book is to provide researchers and engineers from both academic and industry with up-to-date coverage…
of new results in the field of robotic welding, intelligent systems and automation. The book is mainly based on papers selected from the 2022 International Conference on Robotic Welding, Intelligence and Automation (RWIA’2022) in Shanghai and Lanzhou, China. The articles show that the intelligentized welding manufacturing (IWM) is becoming an inevitable trend with the intelligentized robotic welding as the key technology. The volume is divided into four logical parts: Intelligent Techniques for Robotic Welding, Sensing of Arc Welding Processing, Modeling and Intelligent Control of Welding Processing, as well as Intelligent Control and its Applications in Engineering.Edge Intelligent Computing Systems in Different Domains (SpringerBriefs in Computer Science)
Par Benedetta Picano, Romano Fantacci. 2024
This book provides a comprehensive and systematic exploration of next-generation Edge Intelligence (EI) Networks. It delves deep into the critical…
design considerations within this context, emphasizing the necessity for functional and dependable interactions between networking strategies and the diverse application scenarios. This should help assist to encompass a wide range of environments.This book also discusses topics such as resource optimization, incentive mechanisms, channel prediction and cutting-edge technologies, which includes digital twins and advanced machine learning techniques. It underscores the importance of functional integration to facilitate meaningful collaborations between networks and systems, while operating across heterogeneous environments aiming support novel and disruptive human-oriented services and applications. Valuable insights into the stringent requirements for intelligence capabilities, communication latency and real-time response are discussed. This characterizes the new EI era, driving the creation of comprehensive cross-domain architectural ecosystems that infuse human-like intelligence into every aspect of emerging EI systems.This book primarily targets advanced-level students as well as postdoctoral researchers, who are new to this field and are searching for a comprehensive understanding of emerging EI systems. Practitioners seeking guidance in the development and implementation of EI systems in practical contexts will also benefit from this book.Development and Testing of Vehicle Software and its Influence on Sustainable Transport
Par Antonio Colmenar-Santos, David Borge-Diez, Pedro-Miguel Ortega-Cabezas. 2024
This book evaluates the contributions of the electronic control unit software of an electric vehicle on sustainability and society, such…
as the reduction of emissions during a product design and the improvements in the vehicle. A sustainable transport model is proposed, demonstrating its economic viability. By validating software in a more efficient way and adding new functionalities to the software to enhance driving efficiency, energy consumption can be significantly reduced. Therefore, software validation and development have a significant impact on sustainability. This book offers innovative validation solutions based on artificial intelligence techniques to reduce validation time and emissions. The impact of driving efficiency on sustainable transport models is studied in detail, making proposals to be considered in the current environmental policies under discussion within the European Union in order to improve the sustainability of transport models. Vehicles are becoming sophisticated electronic systems due to the fact that they are integrating a significant number of electronic control units. This trend will certainly continue in the year to come. Consequently, software validation techniques are a key element for car manufacturers in order to ensure the quality of the vehicle. This book contributes to these efforts.Statistics and Data Analysis for Engineers and Scientists (Transactions on Computer Systems and Networks)
Par Tanvir Mustafy, Md. Tauhid Rahman. 2024
This textbook summarizes the different statistical, scientific, and financial data analysis methods for users ranging from a high school level…
to a professional level. It aims to combine the data analysis methods using three different programs—Microsoft Excel, SPSS, and MATLAB. The book combining the different data analysis tools is a unique approach. The book presents a variety of real-life problems in data analysis and machine learning, delivering the best solution. Analysis methods presented in this book include but are not limited to, performing various algebraic and trigonometric operations, regression modeling, and correlation, as well as plotting graphs and charts to represent the results. Fundamental concepts of applied statistics are also explained here, with illustrative examples. Thus, this book presents a pioneering solution to help a wide range of students, researchers, and professionals learn data processing, interpret different findings derived from the analyses, and apply them to their research or professional fields. The book also includes worked examples of practical problems. The primary focus behind designing these examples is understanding the concepts of data analysis and how it can solve problems. The chapters include practice exercises to assist users in enhancing their skills to execute statistical analysis calculations using software instead of relying on tables for probabilities and percentiles in the present world.The two-volume set LNCS 14461 and LNCS 14462 constitutes the refereed proceedings of the 17th International Conference on Combinatorial Optimization and Applications, COCOA 2023, held…
in Hawaii, HI, USA, during December 15–17, 2023. The 73 full papers included in the proceedings were carefully reviewed and selected from 117 submissions. They were organized in topical sections as follows: Part I: Optimization in graphs; scheduling; set-related optimization; applied optimization and algorithm; Graph planer and others;Part II: Modeling and algorithms; complexity and approximation; combinatorics and computing; optimization and algorithms; extreme graph and others; machine learning, blockchain and others.The two-volume set LNCS 14461 and LNCS 14462 constitutes the refereed proceedings of the 17th International Conference on Combinatorial Optimization and Applications, COCOA 2023, held…
in Hawaii, HI, USA, during December 15–17, 2023. The 73 full papers included in the proceedings were carefully reviewed and selected from 117 submissions. They were organized in topical sections as follows: Part I: Optimization in graphs; scheduling; set-related optimization; applied optimization and algorithm; Graph planer and others;Part II: Modeling and algorithms; complexity and approximation; combinatorics and computing; optimization and algorithms; extreme graph and others; machine learning, blockchain and others.Take Control of the Mac Command Line with Terminal
Par Joe Kissell. 2022
Release your inner geek and harness the power of the Unix underpinnings to Mac OS X! This ebook from Joe…
Kissell explains everything you need to know to become comfortable working on the command line in Terminal, and provides numerous "recipes" for performing useful tasks.Conversational Artificial Intelligence
Par Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Piyush Vyas, Mary Sowjanya Alamanda, Kotagiri Srividya, Krishnan Sakthidasan Sankaran. 2024
Conversational AI combines natural language processing (NLP) with traditional software like chatbots, voice assistants, or an interactive voice recognition system…
to help customers through either a spoken or typed interface. Conversational chatbots that respond to questions promptly and accurately to help customers are a fascinating development since they make the customer service industry somewhat self-sufficient. A well-automated chatbot can decimate staffing needs, but creating one is a time-consuming process. Voice recognition technologies are becoming more critical as AI assistants like Alexa become more popular. Chatbots in the corporate world have advanced technical connections with clients thanks to improvements in artificial intelligence. However, these chatbots’ increased access to sensitive information has raised serious security concerns. Threats are one-time events such as malware and DDOS (Distributed Denial of Service) assaults. Targeted strikes on companies are familiar and frequently lock workers out. User privacy violations are becoming more common, emphasizing the dangers of employing chatbots. Vulnerabilities are systemic problems that enable thieves to break in. Vulnerabilities allow threats to enter the system, hence they are inextricably linked. Malicious chatbots are widely used to spam and advertise in chat rooms by imitating human behavior and discussions, or to trick individuals into disclosing personal information like bank account details.AI for Radiology (AI for Everything)
Par Oge Marques. 2024
Artificial intelligence (AI) has revolutionized many areas of medicine and is increasingly being embraced. This book focuses on the integral…
role of AI in radiology, shedding light on how this technology can enhance patient care and streamline professional workflows. This book reviews, explains, and contextualizes some of the most current, practical, and relevant developments in artificial intelligence and deep learning in radiology and medical image analysis. AI for Radiology presents a balanced viewpoint of the impact of AI in these fields, underscoring that AI technologies are not intended to replace radiologists but rather to augment their capabilities, freeing professionals to focus on more complex cases. This book guides readers from the basic principles of AI to their practical applications in radiology, moving from the role of data in AI to the ethical and regulatory considerations of using AI in radiology and concluding with a selection of resources for further exploration. This book has been crafted with a diverse readership in mind. It is a valuable asset for medical professionals eager to stay up to date with AI developments, computer scientists curious about AI’s clinical applications, and anyone interested in the intersection of healthcare and technology.Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science #14344)
Par Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis. 2024
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS…
2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.This two-volume set LNCS 14465-14466 constitutes the proceedings of the 31st International Symposium on Graph Drawing and Network Visualization, GD…
2023, held in Isola delle Femmine, Palermo, Italy, in September 2023. The 31 full papers, 7 short papers, presented together with 2 invited talks, and one contest report, were thoroughly reviewed and selected from the 100 submissions. The abstracts of 11 posters presented at the conference can be found in the back matter of the volume. The contributions were organized in topical sections as follows: beyond planarity; crossing numbers; linear layouts; geometric aspects; visualization challenges; graph representations; graph decompositions; topological aspects; parameterized complexity for drawings; planar graphs; frameworks; algorithmics.Pen Testing from Contract to Report
Par Alfred Basta, Nadine Basta, Waqar Anwar. 2024
Pen Testing from Contractto Report Protect your system or web application with this accessible guide Penetration tests, also known as…
‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications. Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions. In Pen Testing from Contract to Report readers will also find: Content mapped to certification exams such as the CompTIA PenTest+Detailed techniques for evading intrusion detection systems, firewalls, honeypots, and moreAccompanying software designed to enable the reader to practice the concepts outlined, as well as end-of-chapter questions and case studies Pen Testing from Contract to Report is ideal for any cyber security professional or advanced student of cyber security.Becoming SRE
Par David N. Blank-Edelman. 2024
Do you wish the existing books on site reliability engineering started at the beginning? Do you wish someone would walk…
you through how to become an SRE, how to think like an SRE, or how to build and grow a successful SRE function in your organization? Becoming SRE addresses all of these needs and more with three interconnected sections: the essential groundwork for understanding SRE and SRE culture, advice for individuals on becoming an SRE, and guidance for organizations on creating and developing a thriving SRE practice. Acting as your personal and personable guide, author David Blank-Edelman takes you through subjects like: SRE mindset, SRE culture, and SRE advocacyWhat you need to get started and hired in SRE and what the job will be like when you get thereWhat you need to bring SRE into an organization and what is required for a good organizational fit so it can thrive thereHow to work with your business folks and management around SREHow SRE can grow and mature in an organization over time Ready to become an SRE or introduce SRE into your organization? This book is here to help.Rogers v. Rogers: The Battle for Control of Canada's Telecom Empire
Par Alexandra Posadzki. 2024
A riveting, deeply reported account that takes us inside the dramatic battle for control of Canada&’s largest wireless carrier, and…
paints a broader picture of the cutthroat telecom industry, the labyrinth of regulatory and political systems that govern it, and the high-stakes corporate games played by the Canadian establishment. Alexandra Posadzki&’s ground-breaking coverage in the Globe and Mail exposed one of the most spectacular boardroom and family dramas in Canadian corporate history—one that has pitted the company&’s extraordinarily powerful chairman and controlling shareholder, Edward Rogers, against not only his own management team but also the wishes of his mother and two of his sisters. Hanging in the balance is no less than the pending $20 billion acquisition of Shaw Communications, a historic deal that promises to transform Rogers into the truly national telecom empire that its late founder, Ted Rogers, always envisioned. Based on deeply sourced, investigative reporting of the iconic $30 billion publicly traded telecom and media giant, Posadzki takes us inside a company that touches the lives of millions of Canadians, challenging what we thought we knew about corporate governance and who really holds the power. Rogers v. Rogers is also a story of family legacy and succession, of an old guard pushing back at the new guard, and of a company struggling to find its footing in the wake of its legendary founder&’s death. At the heart of it all is a dispute between warring factions of the family over how they each interpret the desires of the late patriarch and the very identity of the company that bears their name.The WhatsApp India Story: Inside the Digital Maya Sphere
Par Sunetra Sen Narayan, Shalini Narayanan. 2024
WhatsApp is used by over half a billion people in India today in all fields – in business, corporate and…
informal sectors, in government, for education and among friends, families and acquaintances. This book critically explores the social messaging app’s rapid expansion in India and its growing influence and looks at whether, as a form of horizontal communication, it poses a challenge to more traditional structures of communication. The book examines WhatsApp’s spread in the personal and professional lives of Indians and the myriad ways in which people in India are using the app in social and business interactions, including among people living with disabilities. Using case studies, interviews, surveys and in-depth research, it analyses key aspects of WhatsApp’s massive popularity and its impact on how people communicate. It also explores its impact on the psycho-social dynamics in India, including the dissemination of fake news and politically motivated content, and the consequent need for media regulation in the country. One of the first books to analyse the pervasiveness of WhatsApp and social media apps in different areas of Indian society, this book will be of interest to scholars and students of media studies, communication studies, digital media, cultural studies, cyberculture studies, sociology and social policy and media law.