This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the boo...
In everyday communication, Europe's citizens, business partners and politicians are inevitably confronted with language barriers. Language technology has the potential to overcome these barriers and to provide innovative interfaces to technologies and knowledge. This document presents a Strategic Research Agenda for Multilingual Europe 2020. T...
This book presents results relevant in the manufacturing research field, that are mainly aimed at closing the gap between the academic investigation and the industrial application, in collaboration with manufacturing companies. Several hardware and software prototypes represent the key outcome of the scientific contributions that can be grouped int...
Modern information and communication technologies, together with a cultural upheaval within the research community, have profoundly changed research in nearly every aspect. Ranging from sharing and discussing ideas in social networks for scientists to new collaborative environments and novel publication formats, knowledge creation and dissemination...
This volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. Their potential is explored in detail, while the limits of engineering a company from a communication-centred perspective are also discussed.
After a general introduction and an overview of the book in chapter 1, chapter 2 ...
The book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved in managing access to online resources. After an introduction the book presents cases of general authentication and authorisation. It helps readers understand web based authentication and provides the fundamentals of IP addres...
This book presents nine outstanding doctoral dissertations in Information Technology from the Department of Electronics, Information and Bioengineering, Politecnico di Milano, Italy. Information Technology has always been highly interdisciplinary, as many aspects have to be considered in IT systems. The doctoral studies program in IT at Politecnico...
This book presents an ethical approach to utilizing personal medical data. It features essays that combine academic argument with practical application of ethical principles. The contributors are experts in ethics and law. They address the challenges in the re-use of medical data of the deceased on a voluntary basis. This pioneering study looks at ...
This free book tells the story of how Sweden is becoming a virtually cashless society. Its goal is to improve readers' understanding of what is driving this transition, and of the factors that are fostering and hampering it. In doing so, the book covers the role of central banks, political factors, needs for innovation, and the stakeholders in...
This book, published to mark the 15th anniversary of the International Software Quality Institute (iSQI), is intended to raise the profile of software testers and their profession. It gathers contributions by respected software testing experts in order to highlight the state of the art as well as future challenges and trends. In addition, it covers...
This book examines the future of inequality, work and wages in the age of automation with a focus on developing countries. The authors argue that the rise of a global 'robot reserve army' has profound effects on labor markets and economic development, but, rather than causing mass unemployment, new technologies are more likely to lead to ...
Over the last few years, members of the O'Reilly community have increasingly turned their attention to hardware. It's getting much easier to design, prototype, build and market hardware, and it's getting easier to integrate software and hardware into fluid packages of intelligence, beauty, and intuitive design. Hardware and software ...
If you understand basic mathematics and know how to program with Python, you're ready to dive into signal processing. While most resources start with theory to teach this complex subject, this practical book introduces techniques by showing you how they're applied in the real world. In the first chapter alone, you'll be able to decom...
This book explores the key dimensions of a future education system designed to enable individuals, schools, and communities to achieve the twin twenty-first century challenges of sustainability and human well-being. For much of the twentieth century, Western education systems prepared students to enter the workforce, contribute to society and succe...
This book presents a qualitative longitudinal panel-study on child and adolescent socialisation in socially disadvantaged families. The study traces how children and their parents make sense of media within the context of their everyday life over twelve years (from 2005 to 2017) and provides a unique perspective on the role of different socialisati...
Selfies, blogs and lifelogging devices help us understand ourselves, building on long histories of written, visual and quantitative modes of self-representations. This book uses examples to explore the balance between using technology to see ourselves and allowing our machines to tell us who we are....
This book constitutes the refereed proceedings of the 15th International Conference on Semantic Systems, SEMANTiCS 2019, held in Karlsruhe, Germany, in September 2019.The 20 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 88 submissions. They cover topics such as: web semantics and linked (open) dat...
This book explores the dataspace paradigm as a best-effort approach to data management within data ecosystems. It establishes the theoretical foundations and principles of real-time linked dataspaces as a data platform for intelligent systems. The book introduces a set of specialized best-effort techniques and models to enable loose administrative ...
This book brings together contributions by researchers, scholars, policy-makers, practitioners, professionals and citizens who have an interest in or experience of Indigenous pathways and transitions into higher education. University is not for everyone, but a university should be for everyone. To a certain extent, the choice not to participate in ...
This open access book, inspired by the ICME 13 Thematic Afternoon on "European Didactic Traditions", consists of 17 chapters, in which educators from the Netherlands reflect on the teaching and learning of mathematics in their country and the role of the Dutch domain-specific instruction theory of Realistic Mathematics Education.Written b...
This is a must-read how-to guide if you are planning to embark on a scholarly digitisation project. Tailored to the specifications of the British Library's EAP (Endangered Archives Programme) projects, it is full of sound, practical advice about planning and carrying out a successful digitisation project in potentially challenging conditions.
...
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects ...
Storytelling plays an important part in the vibrant cultural life of Zambia and in many other communities across Africa. This innovative book provides a collection and analysis of oral narrative traditions as practiced by five Bemba-speaking ethnic groups in Zambia. The integration of newly digitalised audio and video recordings into the text enabl...
Take pictures and shoot video with your Raspberry Pi. Connecting a High Quality Camera or Camera Module turns your favourite credit-card-sized computer into a powerful digital camera. Learn how to set up and control the camera to capture stills and video footage. Discover the numerous modes and effects available, and use the camera in a variety of ...
The Raspberry Pi is loved the world over by educators and makers thanks to its tiny size and endless possibilities. Find out why it's loved and how to use it with the latest official Projects Book - we've managed to stuff the fifth edition with another 200 pages of inspiring projects, practical tutorials, and definitive reviews.
- Lear...
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...
This book provides a thorough overview of the ongoing evolution in the application of artificial intelligence (AI) within healthcare and radiology, enabling readers to gain a deeper insight into the technological background of AI and the impacts of new and emerging technologies on medical imaging. After an introduction on game changers in radiology...
This book deals with one the most interesting aspects of human life - the search for meaning. It discusses how the science of semiotics is equipped to provide insight on what meaning is and how we produce it. Why is it that certain people routinely put their survival at risk by smoking? Why is it that some women make locomotion difficult for themse...
This volume provides practical solutions and introduces recent theoretical developments in risk management, pricing of credit derivatives, quantification of volatility and copula modeling. This third edition is devoted to modern risk analysis based on quantitative methods and textual analytics to meet the current challenges in banking and finance. ...
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...
This book on artificial intelligence in education (AIEd) with two aims in mind. The first was to explain to a non-specialist, interested reader what AIEd is: its goals, how it is built, and how it works. After all, only by securing a certain degree of understanding can we move beyond the science-fiction imagery of AI, and the associated fears. The ...
As machine learning is increasingly leveraged to find patterns, conduct analysis, and make decisions - sometimes without final input from humans who may be impacted by these findings - it is crucial to invest in bringing more stakeholders into the fold. This book of Python projects in machine learning tries to do just that: to equip the developers ...