Sequence Analysis and Related Approaches
This open access book provides innovative methods and original applications of sequence analysis (SA) and related methods for analysing longitudinal data describing life trajectories such as professional careers, family paths, the succession of health statuses, or the time use. The applications as well as the methodological contributions propo...
Values and Valuing in Mathematics Education
This engaging free book discusses how a values and valuing perspective can facilitate a more effective mathematics pedagogical experience, and allows readers to explore multiple applications of the values perspective across different education systems. It also clearly shows that teaching mathematics involves not only reasoning and feelings, but als...
Efficient Learning Machines
Machine learning techniques provide cost-effective alternatives to traditional methods for extracting underlying relationships between information and data and for predicting future events by processing existing information to train models. Efficient Learning Machines explores the major topics of machine learning, including knowledge discovery, cla...
Mary and Early Christian Women
This book reveals exciting early Christian evidence that Mary was remembered as a powerful role model for women leaders - women apostles, baptizers, and presiders at the ritual meal. Early Christian art portrays Mary and other women clergy serving as deacon, presbyter/priest, and bishop. In addition, the two oldest surviving artifacts to depict pe...
The Philosophy of Mathematics Education
This survey provides a brief and selective overview of research in the philosophy of mathematics education. It asks what makes up the philosophy of mathematics education, what it means, what questions it asks and answers, and what is its overall importance and use? It provides overviews of critical mathematics education, and the most relevant mode...
Gender Innovation and Migration in Switzerland
"This highly informative book provides precisely analysed situations highlighting migration's crucial role for emancipatory change and hence socio-political innovation. A so far hidden perspective is being made visible and contributes a highly compelling piece for rewriting Switzerland's history."—Julia Nentwich, Research Institute for ...
Internet of Things
First IFIP International Cross-Domain Conference, IFIPIoT 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Revised Selected Papers...
The Cellular Automaton Interpretation of Quantum Mechanics
This book presents the deterministic view of quantum mechanics developed by Nobel Laureate Gerard 't Hooft.Dissatisfied with the uncomfortable gaps in the way conventional quantum mechanics meshes with the classical world, 't Hooft has revived the old hidden variable ideas, but now in a much more systematic way than usual. In this, quantum mechanic...
The Brownian Motion
This open access textbook is the first to provide Business and Economics Ph.D. students with a precise and intuitive introduction to the formal backgrounds of modern financial theory. It explains Brownian motion, random processes, measures, and Lebesgue integrals intuitively, but without sacrificing the necessary mathematical formalism, making them...
Retirement Home? Ageing Migrant Workers in France and the Question of Return
This book offers new insights into the ageing-migration nexus and the nature of home. Documenting the hidden world of France's migrant worker hostels, it explores why older North and West African men continue to live past retirement age in this sub-standard housing. Conventional wisdom holds that at retirement labour migrants ought to instead retur...
Java Web Scraping Handbook
Web scraping or crawling is the art of fetching data from a third party website by downloading and parsing the HTML code to extract the data you want. It can be hard. From bad HTML code to heavy Javascript use and anti-bot techniques, it is often tricky. Lots of companies use it to obtain knowledge concerning competitor prices, news aggregation, ma...
Neural Networks and Deep Learning
This book covers both classical and modern models in deep learning. The chapters of this book span three categories: The basics of neural networks: Many traditional machine learning models can be understood as special cases of neural networks. An emphasis is placed in the first two chapters on understanding the relationship between traditional mac...
jQuery Succinctly
jQuery Succinctly was written to express, in short-order, the concepts essential to intermediate and advanced jQuery development. Its purpose is to instill in you, the reader, practices that jQuery developers take as common knowledge. Each chapter contains concepts essential to becoming a seasoned jQuery developer. This book is intended for two ...
Neural Networks with JavaScript Succinctly
James McCaffrey leads you through the fundamental concepts of neural networks, including their architecture, input-output, tanh and softmax activation, back-propagation, error and accuracy, normalization and encoding, and model interpretation. Although most concepts are relatively simple, there are many of them, and they interact with each other in...
The Piracy Crusade
In the decade and a half since Napster first emerged, forever changing the face of digital culture, the claim that "internet pirates killed the music industry" has become so ubiquitous that it is treated as common knowledge. Piracy is a scourge on legitimate businesses and hard-working artists, we are told, a "cybercrime" simila...
Keras Succinctly
Neural networks are a powerful tool for developers, but harnessing them can be a challenge. With Keras Succinctly, author James McCaffrey introduces Keras, an open-source, neural network library designed specifically to make working with backend neural network tools easier....
Introduction to CNTK Succinctly
Microsoft CNTK (Cognitive Toolkit, formerly Computational Network Toolkit), an open source code framework, enables you to create feed-forward neural network time series prediction systems, convolutional neural network image classifiers, and other deep learning systems. In Introduction to CNTK Succinctly, author James McCaffrey offers instruction on...
The Internet Myth
The Internet Myth retraces and challenges the myth laying at the foundations of the network ideologies - the idea that networks, by themselves, are the main agents of social, economic, political and cultural change. By comparing and integrating different sources related to network histories, this book emphasizes how a dominant narrative has extensi...
Hacking Exposed Web Applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step-by-s...
Python Notes for Professionals
The Python Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Free Innovation
Free innovation is already widespread in national economies and is steadily increasing in both scale and scope. Today, tens of millions of consumers are collectively spending tens of billions of dollars annually on innovation development. However, because free innovations are developed during consumers' unpaid, discretionary time and are given away...
Estimating Illicit Financial Flows
Illicit financial flows constitute a global phenomenon of massive but uncertain scale, which erodes government revenues and drives corruption in countries rich and poor. In 2015, the countries of the world committed to a target to reduce illicit flows, as part of the UN Sustainable Development Goals. But five years later, there is still no agreemen...
GNU GREP and RIPGREP
The book heavily leans on examples to present features of grep as well as regular expressions one by one. It is recommended that you manually type each example and experiment with them. Understanding both the nature of sample input string and the output produced is essential. You should have prior experience working with command line and bash sh...