Signal Computing
In this book, you will learn how digital signals are captured, represented, processed, communicated, and stored in computers. The specific topics we will cover include: physical properties of the source information (such as sound or images), devices for information capture (microphones, cameras), digitization, compression, digital signal representa...
Intelligent Human Computer Interaction
This book constitutes the thoroughly refereed proceedings of the 9th International Conference on Intelligent Human Computer Interaction, IHCI 2017, held in Evry, France, in December 2017. The 15 papers presented together with three invited papers were carefully reviewed and selected from 25 submissions. The conference is forum for the presentation...
Think DSP
If you understand basic mathematics and know how to program with Python, you're ready to dive into signal processing. While most resources start with theory to teach this complex subject, this practical book introduces techniques by showing you how they're applied in the real world. In the first chapter alone, you'll be able to decompose a sound in...
Semiotics in Mathematics Education
This volume discusses semiotics in mathematics education as an activity with a formal sign system, in which each sign represents something else. Theories presented by Saussure, Peirce, Vygotsky and other writers on semiotics are summarized in their relevance to the teaching and learning of mathematics. The significance of signs for mathematics educ...
Interferometry and Synthesis in Radio Astronomy
The 3rd edition of this indispensable book in radio interferometry provides extensive updates to the 2nd edition, including results and technical advances from the past decade; discussion of arrays that now span the full range of the radio part of the electromagnetic spectrum observable from the ground, 10 MHz to 1 THz; an analysis of factors that ...
Nicotinic Acetylcholine Receptor Signaling in Neuroprotection
This book presents the roles and mechanisms of signal transduction triggered by nicotinic acetylcholine receptors (nAChRs) stimulation in neuroprotection against toxic effects of risk factors of neurodegenerative diseases. Accumulating evidence suggests that nAChRs in the CNS play important roles not only in excitatory neurotransmission but also in...
Ambisonics
This book provides a concise explanation of the fundamentals and background of the surround sound recording and playback technology Ambisonics. It equips readers with the psychoacoustical, signal processing, acoustical, and mathematical knowledge needed to understand the inner workings of modern processing utilities, special equipment for recording...
The Haskell School of Music
This free book explores the fundamentals of computer music and functional programming through the Haskell programming language. Functional programming is typically considered difficult to learn. This introduction in the context of creating music will allow students and professionals with a musical inclination to leverage their experience to help un...
Of Cigarettes, High Heels, and Other Interesting Things
This book deals with one the most interesting aspects of human life - the search for meaning. It discusses how the science of semiotics is equipped to provide insight on what meaning is and how we produce it. Why is it that certain people routinely put their survival at risk by smoking? Why is it that some women make locomotion difficult for themse...
Planning and Preparing for Microsoft SharePoint Hybrid
Microsoft SharePoint hybrid deployments are rapidly becoming popular with Microsoft's investments on increased SharePoint productivity, not only in your own environment (on-premises) but also collaborating in new ways through the largest and most advanced cloud service platform in the world - Microsoft Office 365 and Microsoft Azure. SharePoint hyb...
Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinctly, ...
Vote Buying in Indonesia
Muhtadi's analysis of vote-buying in post-democratization Indonesia is original, profound, subtle, nuanced, and convincing as well as beautifully organized and well written. Equally important, its imaginative policy prescriptions will be widely read and cited as a significant contribution to the literature of comparative electoral politics. —Wil...
Innovative Medicine
This book is devoted to innovative medicine, comprising the proceedings of the Uehara Memorial Foundation Symposium 2014. It remains extremely rare for the findings of basic research to be developed into clinical applications, and it takes a long time for the process to be achieved. The task of advancing the development of basic research into clini...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati...
Fragility Fracture Nursing
This book aims to provide a comprehensive but practical overview of the knowledge required for the assessment and management of the older adult with or at risk of fragility fracture. It considers this from the perspectives of all of the settings in which this group of patients receive nursing care. Globally, a fragility fracture is estimated to occ...
Youth Transitions among Descendants of Turkish Immigrants in Amsterdam and Strasbourg:
This book maps the youth transitions of descendants of migrants from Turkey living in Amsterdam and Strasbourg, through a comparative mixed-methods research design. As such, it is of interest to discussions in youth sociology, social mobility and second-generation research. The book follows transition trajectories of the second-generation, from sch...
Volcanic Unrest
This book summarizes the findings of the VUELCO project, a multi-disciplinary and cross-boundary research funded by the European Commission's 7th framework program. It comprises four broad topics:1. The global significance of volcanic unrest2. Geophysical and geochemical fingerprints of unrest and precursory activity3. Magma dynamics le...
Delusions in Context
'This is an excellent and engaging resource on delusions. The idea that delusions should not be seen as radically different from other beliefs… is an important challenge to much contemporary thinking and practice. It should be of interest to anyone studying delusional beliefs, and to all those who aim to help people who are troubled by them.'Phil...
Compartment Syndrome
Compartment syndrome is a complex physiologic process with significant potential harm, and though an important clinical problem, the basic science and research surrounding this entity remains poorly understood. This unique open access book fills the gap in the knowledge of compartment syndrome, re-evaluating the current state of the art on this con...
Medical Imaging Systems
This book gives a complete and comprehensive introduction to the fields of medical imaging systems, as designed for a broad range of applications. The authors of the book first explain the foundations of system theory and image processing, before highlighting several modalities in a dedicated chapter. The initial focus is on modalities that are clo...
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Deltas in the Anthropocene
The Anthropocene is the human-dominated modern era that has accelerated social, environmental and climate change across the world in the last few decades. This book examines the challenges the Anthropocene presents to the sustainable management of deltas, both the many threats as well as the opportunities. In the world's deltas the Anthropocene is ...
The Plight of Older Workers
This book examines the economic, social, and psychological consequences of manufacturing plant closure at the individual level. Using an original data set of over 1,200 workers from Switzerland who lost their manufacturing jobs after the financial crisis of 2008, the author analyzes the determinants of reemployment, the sector of reemployment, and ...
Divorce in Europe
This free book collects the major discussions in divorce research in Europe. It starts with an understanding of divorce trends. Why was divorce increasing so rapidly throughout the US and Europe and do we see signs of a turn? Do cohabitation breakups influence divorce trends or is there a renewed stability on the partner market?In terms of divorce...
The Politics of Language Contact in the Himalaya
This highly original and timely collection brings together case studies from salient areas of the Himalayan region to explore the politics of language contact. Promoting a linguistically and historically grounded perspective, The Politics of Language Contact in the Himalaya offers nuanced insights into language and its relation to power in this geo...
Entreprenerd: Marketing <for> Programmers
A modern web-marketing book that outlines a multi-modal system for growing a website with SEO, Google AdWords/Facebook Ads, Conversion Optimisation, Copywriting/Classic Persuasion/Behavioural Psychology, Google Analytics, Statistical Significance, Email Marketing, and Remarketing. When I launched my first web application it started off with zero tr...
Electronics for Embedded Systems
This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bi...
Plant Physiology, Development and Metabolism
This book focuses on the fundamentals of plant physiology for undergraduate and graduate students. It consists of 34 chapters divided into five major units. Unit I discusses the unique mechanisms of water and ion transport, while Unit II describes the various metabolic events essential for plant development that result from plants’ ability to cap...
Probability and Statistics for Computer Science
This book is aimed at computer science undergraduates late in sophomore or early in junior year, supplying a comprehensive background in qualitative and quantitative data analysis, probability, random variables, and statistical methods, including machine learning.With careful treatment of topics that fill the curricular needs for the course, Probab...
Reinforcement Learning
Reinforcement learning, one of the most active research areas in artificial intelligence, is a computational approach to learning whereby an agent tries to maximize the total amount of reward it receives while interacting with a complex, uncertain environment. In Reinforcement Learning, Richard Sutton and Andrew Barto provide a clear and simple acc...
Crypto 101
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language. Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...

1 2 3 ... 8