Bayesian Methods in the Search for MH370
This book demonstrates how nonlinear/non-Gaussian Bayesian time series estimation methods were used to produce a probability distribution of potential MH370 flight paths. It provides details of how the probabilistic models of aircraft flight dynamics, satellite communication system measurements, environmental effects and radar data were constructed...
Differential Undercounts in the U.S. Census
This book describes the differences in US census coverage, also referred to as "differential undercount", by showing which groups have the highest net undercounts and which groups have the greatest undercount differentials, and discusses why such undercounts occur. In addition to focusing on measuring census coverage for several demograph...
Computing Characterizations of Drugs for Ion Channels and Receptors Using Markov Models
Flow of ions through voltage gated channels can be represented theoretically using stochastic differential equations where the gating mechanism is represented by a Markov model. The flow through a channel can be manipulated using various drugs, and the effect of a given drug can be reflected by changing the Markov model. These lecture notes provide...
Projection-Based Clustering through Self-Organization and Swarm Intelligence
It covers aspects of unsupervised machine learning used for knowledge discovery in data science and introduces a data-driven approach to cluster analysis, the Databionic swarm(DBS). DBS consists of the 3D landscape visualization and clustering of data. The 3D landscape enables 3D printing of high-dimensional data structures.The clustering and numbe...
Understanding Statistics and Experimental Design
This open access textbook provides the background needed to correctly use, interpret and understand statistics and statistical data in diverse settings. Part I makes key concepts in statistics readily clear. Parts I and II give an overview of the most common tests (t-test, ANOVA, correlations) and work out their statistical principles. Part III pr...
Intel Xeon Phi Coprocessor Architecture and Tools
Intel Xeon Phi Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It...
S-BPM Illustrated
S-BPM stands for "subject-oriented business process management" and focuses on subjects that represent the entities (people, programs etc.) that are actively engaged in processes. S-BPM has become one of the most widely discussed approaches for process professionals. Its potential particularly lies in the integration of advanced informati...
Cognitive Supervision for Robot-Assisted Minimally Invasive Laser Surgery
This thesis lays the groundwork for the automatic supervision of the laser incision process, which aims to complement surgeons' perception of the state of tissues and enhance their control over laser incisions. The research problem is formulated as the estimation of variables that are representative of the state of tissues during laser cutting. Pri...
Fashion Figures
Missy Maker is a middle school girl who loves math and fashion. She sees math in everything she does. She tries to hide this from her friends, because she thinks it's too geeky. Missy hears that the school math club needs more members, but she's worried about what her friends will think if she joins, and she's already committed to joining the fashi...
Between Psychology and Philosophy
This book discusses a variety of important but unprecedented ways in which psychology can be useful to philosophy. The early chapters illustrate this theme via comparisons between Chinese and Western philosophy. It is argued that the Chinese notion of a heart-mind is superior to the Western concept of mind, but then, more even-handedly, the relativ...
Paris Climate Agreement: Beacon of Hope
This book presents an Empirical Model of Global Climate developed by the authors and uses that model to show that global warming will likely remain below 2ºC, relative to preindustrial, throughout this century provided: a) both the unconditional and conditional Paris INDC commitments are followed; b) the emission reductions needed to achieve the P...
Agricultural Implications of the Fukushima Nuclear Accident
This book reports the results from on-site research into radioactive cesium contamination in various agricultural systems affected by the Fukushima Daiichi Nuclear Power Plant accident that occurred in March 2011. This is the second volume from the research groups formed in the Graduate School of Agricultural and Life Sciences of The University of ...
GUI Design for Android Apps
GUI Design for Android Apps is the perfect - and concise - introduction for mobile app developers and designers. Through easy-to-follow tutorials, code samples, and case studies, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices. T...
Ambisonics
This book provides a concise explanation of the fundamentals and background of the surround sound recording and playback technology Ambisonics. It equips readers with the psychoacoustical, signal processing, acoustical, and mathematical knowledge needed to understand the inner workings of modern processing utilities, special equipment for recording...
Transforms in CSS
Present information in stunning new ways by transforming CSS elements in two- and three-dimensional space. Whether you're rotating a photo, doing some interesting perspective tricks, or creating an interface that lets you reveal information on an element's backside, this practical guide shows you how to use them to great effect....
Exploring .NET Core
Windows developers have always enjoyed the productivity boost you get with the .NET platform, tools like Entity Framework and ASP.NET, and the amazingly-powerful C# language. Now, .NET Core extends those same benefits to Linux-based systems, offering a true cross-platform solution for enterprise application development. The .NET Core tools, includi...
Think DSP
If you understand basic mathematics and know how to program with Python, you're ready to dive into signal processing. While most resources start with theory to teach this complex subject, this practical book introduces techniques by showing you how they're applied in the real world. In the first chapter alone, you'll be able to decompose a sound in...
Think Stats
If you know how to program, you have the skills to turn data into knowledge, using tools of probability and statistics. This concise introduction shows you how to perform statistical analysis computationally, rather than mathematically, with programs written in Python. By working with a single case study throughout this thoroughly revised book, ...
Earthquakes, Tsunamis and Nuclear Risks
This book covers seismic probabilistic risk assessment (S-PRA) and related studies which have become more important to increase the safety of nuclear facilities against earthquakes and tsunamis in the face of the many uncertainties after the Fukushima accident. The topics are (1) Active faults and active tectonics important for seismic hazard asses...
Student Misconceptions and Errors in Physics and Mathematics
This open access report explores the nature and extent of students' misconceptions and misunderstandings related to core concepts in physics and mathematics and physics across grades four, eight and 12. Twenty years of data from the IEA's Trends in International Mathematics and Science Study (TIMSS) and TIMSS Advanced assessments are analyzed, spec...
Measure, Integration & Real Analysis
This open access textbook welcomes students into the fundamental theory of measure, integration, and real analysis. Focusing on an accessible approach, Axler lays the foundations for further study by promoting a deep understanding of key results. Content is carefully curated to suit a single course, or two-semester sequence of courses, creating a v...
RESTful Web Services
You've built web sites that can be used by humans. But can you also build web sites that are usable by machines? That's where the future lies, and that's what RESTful Web Services shows you how to do. The World Wide Web is the most popular distributed application in history, and Web services and mashups have turned it into a powerful distributed co...
Welcome to the Beatles
Organized, authored, and edited over the course of five months by a class of eighteen Virginia Tech undergraduate students, Welcome to the Beatles represents their collective contribution to the larger scholarship on the most important band in rock history. The chapters build upon the work of noted author and historian Mark Lewisohn and take into a...
Neural Networks and Deep Learning
This book covers both classical and modern models in deep learning. The chapters of this book span three categories: The basics of neural networks: Many traditional machine learning models can be understood as special cases of neural networks. An emphasis is placed in the first two chapters on understanding the relationship between traditional mac...
Optimization of Process Flowsheets through Metaheuristic Techniques
This book presents a general multi-objective optimization framework for optimizing chemical processes by implementing a link between process simulators and metaheuristic techniques. The proposed approach is general and shows how to implement links between different process simulators such as Aspen Plus, HYSIS, Super Pro Designer linked to a variety...
Probability and Statistics for Computer Science
This book is aimed at computer science undergraduates late in sophomore or early in junior year, supplying a comprehensive background in qualitative and quantitative data analysis, probability, random variables, and statistical methods, including machine learning.With careful treatment of topics that fill the curricular needs for the course, Probab...
Teaching Medicine and Medical Ethics Using Popular Culture
This book demonstrates how popular culture can be successfully incorporated into medical and health science curriculums, capitalising on the opportunity fictional media presents to humanise case studies. Studies show that the vast majority of medical and nursing students watch popular medical television dramas and comedies such as Grey’s Anatomy,...
SQL Server Metadata Succinctly
SQL Server is a very complex and powerful product, but it provides tremendous amounts of data about itself. You can use this metadata to improve your database design, increase performance, review security, and more. Joseph D. Booth will show readers sample scripts and queries using information schema views as well as SQL Server-specific views in SQ...
Deploying Windows 10
Get a head start deploying Windows 10 - with tips and best practices from experts in the field. This guide shows you how to deploy Windows 10 in an automated way without impacting end users by leveraging System Center Configuration Manager, which is the most used product to deploy Microsoft operating systems in the industry today. Windows 10 rep...
Git Notes for Professionals
The Git Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Business Process Flow Mapping Succinctly
In a company, when the business process is defined, employees feel confident in their roles. They understand expectations and can easily identify when something is amiss or requires escalation. In Business Process Flow Mapping Succinctly, Erica Quigley will show you the activities that should occur in order to completely define a business process s...
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...

1 2 3 ... 13