Clinical Text Mining
This book describes the results of natural language processing and machine learning methods applied to clinical text from electronic patient records.It is divided into twelve chapters. Chapters 1-4 discuss the history and background of the original paper-based patient records, their purpose, and how they are written and structured. These initial ch...
Mining Social Media
Did fake Twitter accounts help sway a presidential election? What can Facebook and Reddit archives tell us about human behavior? In Mining Social Media, senior BuzzFeed reporter Lam Thuy Vo shows you how to use Python and key data analysis tools to find the stories buried in social media. Whether you're a professional journalist, an academic res...
Text Mining with R
Much of the data available today is unstructured and text-heavy, making it challenging for analysts to apply their usual data wrangling and visualization tools. With this practical book, you'll explore text-mining techniques with tidytext, a package that authors Julia Silge and David Robinson developed using the tidy principles behind R packages li...
Environmental Governance in Latin America
The multiple purposes of nature - livelihood for communities, revenues for states, commodities for companies, and biodiversity for conservationists - have turned environmental governance in Latin America into a highly contested arena. In such a resource-rich region, unequal power relations, conflicting priorities, and trade-offs among multiple goal...
Cognitive Supervision for Robot-Assisted Minimally Invasive Laser Surgery
This thesis lays the groundwork for the automatic supervision of the laser incision process, which aims to complement surgeons' perception of the state of tissues and enhance their control over laser incisions. The research problem is formulated as the estimation of variables that are representative of the state of tissues during laser cutting. Pri...
Big Data in Context
This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, sociological and economic approaches to fundamental big data topics such as privacy, data quality and the ECJ's Safe Harbor decision on the one hand, and practical applications such as smart cars, wearables and web tracking on th...
Trade Union Cooperation in Europe
This open access book discusses transnational trade union cooperation in Europe – its forms, focuses, conditions, and obstacles. It provides an overview of existing trade union cooperation and includes detailed analyses of two specific questions: the debates on statutory minimum wages and the Posting of Workers Directive. Drawing on empirical res...
Migration and Social Protection in Europe and Beyond (Volume 1)
This first open access book in a series of three volumes provides an in-depth analysis of social protection policies that EU Member States make accessible to resident nationals, non-resident nationals and non-national residents. In doing so, it discusses different scenarios in which the interplay between nationality and residence could lead to ineq...
Niche Wars
Australia invoked the ANZUS Alliance following the Al Qaeda attacks in the United States on 11 September 2001. But unlike the calls to arms at the onset of the world wars, Australia decided to make only carefully calibrated force contributions in support of the US-led coalition campaigns in Afghanistan and Iraq. Why is this so? Niche Wars examin...
Migration and Social Protection in Europe and Beyond (Volume 3)
This third and last open volume in the series takes the perspective of non-EU countries on immigrant social protection. By focusing on 12 of the largest sending countries to the EU, the book tackles the issue of the multiple areas of sending state intervention towards migrant populations. Two "mirroring" chapters are dedicated to each of ...
Library and Information Sciences
This book explores the development, trends and research of library and information sciences (LIS) in the digital age. Inside, readers will find research and case studies written by LIS experts, educators and theorists, most of whom have visited China, delivered presentations there and drafted their articles based on feedback they received. As a res...
Japan's Arduous Rejuvenation as a Global Power
This book assesses the profound impact of Japan's aspirations to become a great power on Japanese security, democracy and foreign relations. Rather than viewing the process of normalization and rejuvenation as two decades of remilitarization in face of rapidly changing strategic environment and domestic political circumstances, this volume context...
Secondary Analysis of Electronic Health Records
This open book trains the next generation of scientists representing different disciplines to leverage the data generated during routine patient care. It formulates a more complete lexicon of evidence-based recommendations and support shared, ethical decision making by doctors with their patients. Diagnostic and therapeutic technologies continue ...
Data and Text Processing for Health and Life Sciences
This book is a step-by-step introduction on how shell scripting can help solve many of the data processing tasks that Health and Life specialists face everyday with minimal software dependencies. The examples presented in the book show how simple command line tools can be used and combined to retrieve data and text from web resources, to filter and...
Rising Powers and Peacebuilding
This edited volume examines the policies and practices of rising powers on peacebuilding. It analyzes how and why their approaches differ from those of traditional donors and multilateral institutions. The policies of the rising powers towards peacebuilding may significantly influence how the UN and others undertake peacebuilding in the future. Thi...
Tobacco Control Policy in the Netherlands
Governments have known since the 1960s that smoking results in irreversible health damage. This book examines why governments have done so little to combat this when they have been aware of the problem and its solutions for decades. What are the strategies and decisions that make a difference, given that policy environments are often not conducive ...
Practical Economics
In this book, Nika Gilauri reveals his formulas for government reform and economic recovery, including how to fight against corruption, reform fiscal policy and tax systems, privatize state-owned enterprises, build a welfare system for those most in need, create a competitive education and healthcare system, and streamline procurement. All formulas...
Improving Psychiatric Care for Older People
This book tells the story of Barbara Robb and her pressure group, Aid for the Elderly in Government Institutions (AEGIS). In 1965, Barbara visited 73-year-old Amy Gibbs in a dilapidated and overcrowded National Health Service psychiatric hospital back-ward. She was so appalled by the low standards that she set out to make improvements. Barbara's bo...
Indigenous Life Projects and Extractivism
Exploring indigenous life projects in encounters with extractivism, the present open access volume discusses how current turbulences actualise questions of indigeneity, difference and ontological dynamics in the Andes and Amazonia. While studies of extractivism in South America often focus on wider national and international politics, this contribu...
Science as Social Existence
In this bold and original study, Jeff Kochan constructively combines the sociology of scientific knowledge (SSK) with Martin Heidegger's early existential conception of science. Kochan shows convincingly that these apparently quite different approaches to science are, in fact, largely compatible, even mutually reinforcing. By combining Heidegger...
Vermin, Victims and Disease
"Dr Cassidy draws pertinent general conclusions about generating policy and mediating the role of the expert in today's science-sceptic and increasingly polarised society... It is both a useful and original contribution, specifically to the history of zoonotic disease policy, and policy history more generally."—Helen Bynum, Author of Sp...
Computational Conflict Research
This free book brings together a set of original studies that use cutting-edge computational methods to investigate conflict at various geographic scales and degrees of intensity and violence. Methodologically, this book covers a variety of computational approaches from text mining and machine learning to agent-based modelling and social network an...
Semantic Systems. The Power of AI and Knowledge Graphs
This book constitutes the refereed proceedings of the 15th International Conference on Semantic Systems, SEMANTiCS 2019, held in Karlsruhe, Germany, in September 2019.The 20 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 88 submissions. They cover topics such as: web semantics and linked (open) dat...
Evolution, Monitoring and Predicting Models of Rockburst
This open book focuses on investigating predicting precursor information and key points of rockburst in mining engineering through laboratory experiment, theoretical analysis, numerical simulation and case studies. Understanding the evolution patterns for the microstructure instability of rock is a prerequisite for rockburst prediction. The book pr...
Multiple-Aspect Analysis of Semantic Trajectories
This free book constitutes the refereed post-conference proceedings of the First International Workshop on Multiple-Aspect Analysis of Semantic Trajectories, MASTER 2019, held in conjunction with the 19th European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2019, in Würzburg, Germany, in September 2019. The 8 ful...
Statistical Learning and Sequential Prediction
This free book will focus on theoretical aspects of Statistical Learning and Sequential Prediction. Until recently, these two subjects have been treated separately within the learning community. The course will follow a unified approach to analyzing learning in both scenarios. To make this happen, we shall bring together ideas from probability and ...
An Introduction to Machine Learning
This textbook presents fundamental machine learning concepts in an easy to understand manner by providing practical advice, using straightforward examples, and offering engaging discussions of relevant applications. The main topics include Bayesian classifiers, nearest-neighbor classifiers, linear and polynomial classifiers, decision trees, neural ...
Off-Grid Electrical Systems in Developing Countries
This book provides students and practicing engineers with a comprehensive guide to off-grid electrification: from microgrids and energy kiosks to solar home systems and solar lanterns. As the off-grid electrification industry grows, universities are starting and expanding courses and programs in humanitarian engineering and appropriate technology. ...
Multimedia Big Data Computing for IoT Applications
This book considers all aspects of managing the complexity of Multimedia Big Data Computing (MMBD) for IoT applications and develops a comprehensive taxonomy. It also discusses a process model that addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (...
Algorithms
Algorithms are the lifeblood of computer science. They are the machines that proofs build and the music that programs play. Their history is as old as mathematics itself. This book is a wide-ranging, idiosyncratic treatise on the design and analysis of algorithms, covering several fundamental techniques, with an emphasis on intuition and the proble...
Algorithms Notes for Professionals
The Algorithms Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
The Security Development Lifecycle
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team ...

1 2 3 ... 5