Computing Characterizations of Drugs for Ion Channels and Receptors Using Markov Models
Flow of ions through voltage gated channels can be represented theoretically using stochastic differential equations where the gating mechanism is represented by a Markov model. The flow through a channel can be manipulated using various drugs, and the effect of a given drug can be reflected by changing the Markov model. These lecture notes provide...
Innovative Medicine
This book is devoted to innovative medicine, comprising the proceedings of the Uehara Memorial Foundation Symposium 2014. It remains extremely rare for the findings of basic research to be developed into clinical applications, and it takes a long time for the process to be achieved. The task of advancing the development of basic research into clini...
Riverine Ecosystem Management
This book surveys the frontier of scientific river research and provides examples to guide management towards a sustainable future of riverine ecosystems. Principal structures and functions of the biogeosphere of rivers are explained; key threats are identified, and effective solutions for restoration and mitigation are provided. Rivers are among ...
Asterisk: The Future of Telephony
This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared! Revised for the 1.4 release of the software, the new edition of Asterisk: The Future of Telephony reveals how you can save money on equipment and support, and finally be in control ...
Trade Unions on YouTube
This book investigates how trade unions representing different social classes use YouTube videos for renewal purposes. Information and communication technology has undoubtedly offered new opportunities for social movements, but while research suggests that these new means of communication can be used for trade union revitalization, few studies hav...
Bayesian Methods in the Search for MH370
This book demonstrates how nonlinear/non-Gaussian Bayesian time series estimation methods were used to produce a probability distribution of potential MH370 flight paths. It provides details of how the probabilistic models of aircraft flight dynamics, satellite communication system measurements, environmental effects and radar data were constructed...
Wetlands and Water Framework Directive
This book compares the lessons learned from a wetland-perspective approach to the changing climate and the requirements of the Water Framework Directive (WFD) with regard to environmental conservation. Examples from Germany and Poland are discussed due to the efficiency of their respective implementations of water conservation policies. Although th...
Intel Xeon Phi Coprocessor Architecture and Tools
Intel Xeon Phi Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It...
Autonomous Control for a Reliable Internet of Services
This free book was prepared as a Final Publication of the COST Action IC1304 "Autonomous Control for a Reliable Internet of Services (ACROSS)". The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-grad...
Mobilities of the Highly Skilled towards Switzerland
This book analyses the strategies of migration intermediaries from the public and private sectors in Switzerland to select, attract, and retain highly skilled migrants who represent value to them. It reveals how state and economic actors define "wanted immigrants" and provide them with privileged access to the Swiss territory and labour m...
Sexual Reproduction in Animals and Plants
This book contains the proceedings of the International Symposium on the Mechanisms of Sexual Reproduction in Animals and Plants, where many plant and animal reproductive biologists gathered to discuss their recent progress in investigating the shared mechanisms and factors involved in sexual reproduction. This now is the first book that reviews re...
Error-Correction Coding and Decoding
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the boo...
Ambisonics
This book provides a concise explanation of the fundamentals and background of the surround sound recording and playback technology Ambisonics. It equips readers with the psychoacoustical, signal processing, acoustical, and mathematical knowledge needed to understand the inner workings of modern processing utilities, special equipment for recording...
Charismatic Christianity in Finland, Norway, and Sweden
The history of Charismatic Christianity in the Nordic countries reaches as far back as Pentecostalism itself. The bounds of these categories remain a topic of discussion, but Nordic countries have played a vital role for developing this rapidly spreading form of world-wide Christianity. Until now, research on global Charismatic Christianity has la...
Dynamic Spectrum Management
This open access book, authored by a world-leading researcher in this field, describes fundamentals of dynamic spectrum management, provides a systematic overview on the enabling technologies covering cognitive radio, blockchain, and artificial intelligence, and offers valuable guidance for designing advanced wireless communications systems. This b...
Bioimage Data Analysis Workflows
This Open Access textbook provides students and researchers in the life sciences with essential practical information on how to quantitatively analyze data images. It refrains from focusing on theory, and instead uses practical examples and step-by step protocols to familiarize readers with the most commonly used image processing and analysis platf...
Towards a Systemic Theory of Irregular Migration
This open access book provides an alternative theoretical framework of irregular migration that allows to overcome many of the contradictions and theoretical impasses displayed by the majority of approaches in current literature. The analytical framework allows moving from an interpretation biased by methodological nationalism, to a more general sy...
802.11ac: A Survival Guide
The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring. Author Matthew Gast - an industry expert who led the development of ...
Entertainment Science
The entertainment industry has long been dominated by legendary screenwriter William Goldman’s “Nobody-Knows-Anything” mantra, which argues that success is the result of managerial intuition and instinct. This book builds the case that combining such intuition with data analytics and rigorous scholarly knowledge provides a source of sustainab...
Android Notes for Professionals
The Android Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Marketing and Advertising Using Google
The official book from Google for students preparing for careers in marketing. Learn to: Create effective Internet advertising, target advertising to people when they're ready to buy, control you advertising budget, and build your brand....
Crypto 101
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language. Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
The Little Go Book
The Little Go Book is a free introduction to Google's Go programming language. It's aimed at developers who might not be quite comfortable with the idea of pointers and static typing. It's longer than the other Little books, but hopefully still captures that little feeling....
Networking with the Micro:bit
This book presents a series of activities to teach the basics of computer networks. While you will not learn all aspects of computer networking, we hope that it will serve as a good starting point. To network micro:bits, we use custom micro:bit radio to radio communication. When one hears the word radio, what comes to mind is the radio that blas...
A European Public Investment Outlook
This outlook provides a focused assessment of the state of public capital in the major European countries and identifies areas where public investment could contribute more to stable and sustainable growth. A European Public Investment Outlook brings together contributions from a range of international authors from diverse intellectual and professi...
Estimating Illicit Financial Flows
Illicit financial flows constitute a global phenomenon of massive but uncertain scale, which erodes government revenues and drives corruption in countries rich and poor. In 2015, the countries of the world committed to a target to reduce illicit flows, as part of the UN Sustainable Development Goals. But five years later, there is still no agreemen...
Go Succinctly
The Go programming language is relatively small and concise, but its depth makes it an ideal option for solving modern-day development problems. In Go Succinctly, author Mark Lewin guides readers through the basics of Go, and he provides documentation and resources that allow users to dive into the language and learn it for themselves. By the end o...