Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Nonparametric Bayesian Learning for Collaborative Robot Multimodal Introspection
This open book focuses on robot introspection, which has a direct impact on physical human - robot interaction and long-term autonomy, and which can benefit from autonomous anomaly monitoring and diagnosis, as well as anomaly recovery strategies. In robotics, the ability to reason, solve their own anomalies and proactively enrich owned knowledge is...
Sequence Analysis and Related Approaches
This open access book provides innovative methods and original applications of sequence analysis (SA) and related methods for analysing longitudinal data describing life trajectories such as professional careers, family paths, the succession of health statuses, or the time use. The applications as well as the methodological contributions propo...
Values and Valuing in Mathematics Education
This engaging free book discusses how a values and valuing perspective can facilitate a more effective mathematics pedagogical experience, and allows readers to explore multiple applications of the values perspective across different education systems. It also clearly shows that teaching mathematics involves not only reasoning and feelings, but als...
Efficient Learning Machines
Machine learning techniques provide cost-effective alternatives to traditional methods for extracting underlying relationships between information and data and for predicting future events by processing existing information to train models. Efficient Learning Machines explores the major topics of machine learning, including knowledge discovery, cla...
Mining Social Media
Did fake Twitter accounts help sway a presidential election? What can Facebook and Reddit archives tell us about human behavior? In Mining Social Media, senior BuzzFeed reporter Lam Thuy Vo shows you how to use Python and key data analysis tools to find the stories buried in social media. Whether you're a professional journalist, an academi...
Modes of Bio-Bordering
This open book explores how biometric data is increasingly flowing across borders in order to limit, control and contain the mobility of selected people, namely criminalized populations. It introduces the concept of bio-bordering, using it to capture reverse patterns of bordering and ordering practices linked to transnational biometric data exchang...
Script Effects as the Hidden Drive of the Mind, Cognition, and Culture
This open volume reveals the hidden power of the script we read in and how it shapes and drives our minds, ways of thinking, and cultures. Expanding on the Linguistic Relativity Hypothesis (i.e., the idea that language affects the way we think), this volume proposes the "Script Relativity Hypothesis" (i.e., the idea that the script in whi...
Sensing Absence: How to See What Isn't There in the Study of Science and Security
This is a chapter from Absence in Science, Security and Policy edited by Brian Rappert and Brian Balmer. Part reflection on the forthcoming chapters, part analysis of academic literature, and part programmatic agenda setting, this introduction chapter forwards the importance of questioning taken for granted assumptions in sensing what is absent as ...
Mary and Early Christian Women
This book reveals exciting early Christian evidence that Mary was remembered as a powerful role model for women leaders - women apostles, baptizers, and presiders at the ritual meal. Early Christian art portrays Mary and other women clergy serving as deacon, presbyter/priest, and bishop. In addition, the two oldest surviving artifacts to depict pe...
The Philosophy of Mathematics Education
This survey provides a brief and selective overview of research in the philosophy of mathematics education. It asks what makes up the philosophy of mathematics education, what it means, what questions it asks and answers, and what is its overall importance and use? It provides overviews of critical mathematics education, and the most relevant mode...
Gender Innovation and Migration in Switzerland
"This highly informative book provides precisely analysed situations highlighting migration's crucial role for emancipatory change and hence socio-political innovation. A so far hidden perspective is being made visible and contributes a highly compelling piece for rewriting Switzerland's history."—Julia Nentwich, Research Inst...
Internet of Things
First IFIP International Cross-Domain Conference, IFIPIoT 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Revised Selected Papers...
The Cellular Automaton Interpretation of Quantum Mechanics
This book presents the deterministic view of quantum mechanics developed by Nobel Laureate Gerard 't Hooft.Dissatisfied with the uncomfortable gaps in the way conventional quantum mechanics meshes with the classical world, 't Hooft has revived the old hidden variable ideas, but now in a much more systematic way than usual. In this, quantu...
The Brownian Motion
This open access textbook is the first to provide Business and Economics Ph.D. students with a precise and intuitive introduction to the formal backgrounds of modern financial theory. It explains Brownian motion, random processes, measures, and Lebesgue integrals intuitively, but without sacrificing the necessary mathematical formalism, making them...
Retirement Home? Ageing Migrant Workers in France and the Question of Return
This book offers new insights into the ageing-migration nexus and the nature of home. Documenting the hidden world of France's migrant worker hostels, it explores why older North and West African men continue to live past retirement age in this sub-standard housing. Conventional wisdom holds that at retirement labour migrants ought to instead ...
Java Web Scraping Handbook
Web scraping or crawling is the art of fetching data from a third party website by downloading and parsing the HTML code to extract the data you want. It can be hard. From bad HTML code to heavy Javascript use and anti-bot techniques, it is often tricky. Lots of companies use it to obtain knowledge concerning competitor prices, news aggregation, ma...
Neural Networks and Deep Learning
This book covers both classical and modern models in deep learning. The chapters of this book span three categories: The basics of neural networks: Many traditional machine learning models can be understood as special cases of neural networks. An emphasis is placed in the first two chapters on understanding the relationship between traditional mac...
jQuery Succinctly
jQuery Succinctly was written to express, in short-order, the concepts essential to intermediate and advanced jQuery development. Its purpose is to instill in you, the reader, practices that jQuery developers take as common knowledge. Each chapter contains concepts essential to becoming a seasoned jQuery developer. This book is intended for two ...
Neural Networks with JavaScript Succinctly
James McCaffrey leads you through the fundamental concepts of neural networks, including their architecture, input-output, tanh and softmax activation, back-propagation, error and accuracy, normalization and encoding, and model interpretation. Although most concepts are relatively simple, there are many of them, and they interact with each other in...
The Piracy Crusade
In the decade and a half since Napster first emerged, forever changing the face of digital culture, the claim that "internet pirates killed the music industry" has become so ubiquitous that it is treated as common knowledge. Piracy is a scourge on legitimate businesses and hard-working artists, we are told, a "cybercrime" simila...
Keras Succinctly
Neural networks are a powerful tool for developers, but harnessing them can be a challenge. With Keras Succinctly, author James McCaffrey introduces Keras, an open-source, neural network library designed specifically to make working with backend neural network tools easier....
Introduction to CNTK Succinctly
Microsoft CNTK (Cognitive Toolkit, formerly Computational Network Toolkit), an open source code framework, enables you to create feed-forward neural network time series prediction systems, convolutional neural network image classifiers, and other deep learning systems. In Introduction to CNTK Succinctly, author James McCaffrey offers instruction on...
The Internet Myth
The Internet Myth retraces and challenges the myth laying at the foundations of the network ideologies - the idea that networks, by themselves, are the main agents of social, economic, political and cultural change. By comparing and integrating different sources related to network histories, this book emphasizes how a dominant narrative has extensi...
Hacking Exposed Web Applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step...
Python Notes for Professionals
The Python Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Free Innovation
Free innovation is already widespread in national economies and is steadily increasing in both scale and scope. Today, tens of millions of consumers are collectively spending tens of billions of dollars annually on innovation development. However, because free innovations are developed during consumers' unpaid, discretionary time and are given...
Estimating Illicit Financial Flows
Illicit financial flows constitute a global phenomenon of massive but uncertain scale, which erodes government revenues and drives corruption in countries rich and poor. In 2015, the countries of the world committed to a target to reduce illicit flows, as part of the UN Sustainable Development Goals. But five years later, there is still no agreemen...
GNU GREP and RIPGREP
The book heavily leans on examples to present features of grep as well as regular expressions one by one. It is recommended that you manually type each example and experiment with them. Understanding both the nature of sample input string and the output produced is essential. You should have prior experience working with command line and bash sh...
Connectionist Representations of Tonal Music
Previously, artificial neural networks have been used to capture only the informal properties of music. However, cognitive scientist Michael Dawson found that by training artificial neural networks to make basic judgments concerning tonal music, such as identifying the tonic of a scale or the quality of a musical chord, the networks revealed formal...
Learning Twitter Bootstrap
Bootstrap is a HTML, CSS, and JavaScript framework used to create websites that are created using a mobile-first paradigm as well as responsive web design (RWD). It uses a combination of premade CSS classes and JavaScript to make a variety of things on the web. It includes things such as a custom, responsive grid that allows websites to be viewed i...
Representation Learning for Natural Language Processing
This open book provides an overview of the recent advances in representation learning theory, algorithms and applications for natural language processing (NLP). It is divided into three parts. Part I presents the representation learning techniques for multiple language entries, including words, phrases, sentences and documents. Part II then introdu...
100 Laravel Quick Tips
Laravel is full of hidden gems, undocumented or less-known features, functions parameters and "hacks". While finding them in work of my team, I decided to compile them into an ebook....

1 2