Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Safety Cultures, Safety Models
The objective of this book is to help at-risk organizations to decipher the "safety cloud", and to position themselves in terms of operational decisions and improvement strategies in safety, considering the path already travelled, their context, objectives and constraints. What link can be established between safety culture and safety mod...
Computational Conflict Research
This free book brings together a set of original studies that use cutting-edge computational methods to investigate conflict at various geographic scales and degrees of intensity and violence. Methodologically, this book covers a variety of computational approaches from text mining and machine learning to agent-based modelling and social network an...
Boundary Value Problems, Weyl Functions, and Differential Operators
This book presents a comprehensive survey of modern operator techniques for boundary value problems and spectral theory, employing abstract boundary mappings and Weyl functions. It includes self-contained treatments of the extension theory of symmetric operators and relations, spectral characterizations of selfadjoint operators in terms of the anal...
From Assessing to Conserving Biodiversity
This book features essays written by philosophers, biologists, ecologists and conservation scientists facing the current biodiversity crisis. Despite increasing communication, accelerating policy and management responses, and notwithstanding improving ecosystem assessment and endangered species knowledge, conserving biodiversity continues to be mor...
P5 eHealth: An Agenda for the Health Technologies of the Future
This open access volume focuses on the development of a P5 eHealth, or better, a methodological resource for developing the health technologies of the future, based on patients' personal characteristics and needs as the fundamental guidelines for design. It provides practical guidelines and evidence based examples on how to design, implement, ...
Education for Children with Disabilities in Addis Ababa, Ethiopia
This book presents insights into the lived realities of children with disabilities in primary schools in Addis Ababa, Ethiopia. It examines specific cultural and societal characteristics of Ethiopia that influence the education of children with disabilities. The book presents findings drawn from interviews with, and participant observation of the s...
Lewis Fry Richardson: His Intellectual Legacy and Influence in the Social Sciences
This is an open access book. Lewis F Richardson (1981-1953), a physicist by training, was a pioneer in meteorology and peace research and remains a towering presence in both fields. This edited volume reviews his work and assesses its influence in the social sciences, notably his work on arms races and their consequences, mathematical models, the s...
Multiple-Aspect Analysis of Semantic Trajectories
This free book constitutes the refereed post-conference proceedings of the First International Workshop on Multiple-Aspect Analysis of Semantic Trajectories, MASTER 2019, held in conjunction with the 19th European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2019, in Würzburg, Germany, in September 2019. The 8 ful...
Bioimage Data Analysis Workflows
This Open Access textbook provides students and researchers in the life sciences with essential practical information on how to quantitatively analyze data images. It refrains from focusing on theory, and instead uses practical examples and step-by step protocols to familiarize readers with the most commonly used image processing and analysis platf...
National Reflections on the Netherlands Didactics of Mathematics
This open access book, inspired by the ICME 13 Thematic Afternoon on "European Didactic Traditions", consists of 17 chapters, in which educators from the Netherlands reflect on the teaching and learning of mathematics in their country and the role of the Dutch domain-specific instruction theory of Realistic Mathematics Education.Written b...
Contextual Process Digitalization
This free book presents an overview and step-by-step explanation of process management. It starts with the individual participants' perspectives on their work in a process and its structuring and harmonization, and then moves on to its specification in a model and how it is embedded in the organizational and IT environment of the company. Last...
Preparing for Life in a Digital World
This book summarizes the key findings from the second cycle of IEA's International Computer and Information Literacy Study (ICILS), conducted in 2018. ICILS seeks to establish how well schools around the globe are responding to the need to provide young people with the necessary digital participatory competencies. Effective use of information ...
Vulnerability in Scandinavian Art and Culture
In this open access book, seventeen scholars discuss how contemporary Scandinavian art and media have become important arenas to articulate and stage various forms of vulnerability in the Scandinavian welfare states. How do discourses of privilege and vulnerability coexist and interact in Scandinavia? How do the Scandinavian countries respond to vu...
Ionospheric Multi-Spacecraft Analysis Tools
This book provides a comprehensive toolbox of analysis techniques forionospheric multi-satellite missions. The immediate need for this volume was motivatedby the ongoing ESA Swarm satellite mission, but the tools that are described are generaland can be used for any future ionospheric multi-satellite mission with comparableinstrumentation. In addi...
Measure, Integration & Real Analysis
This open access textbook welcomes students into the fundamental theory of measure, integration, and real analysis. Focusing on an accessible approach, Axler lays the foundations for further study by promoting a deep understanding of key results. Content is carefully curated to suit a single course, or two-semester sequence of courses, creating a v...
Bridging Educational Leadership, Curriculum Theory and Didaktik
This volume argues for the need of a common ground that bridges leadership studies, curriculum theory, and Didaktik. It proposes a non-affirmative education theory and its core concepts along with discursive institutionalism as an analytical tool to bridge these fields. It concludes with implications of its coherent theoretical framing for future e...
Diseases of the Brain, Head and Neck, Spine 2020–2023
This open access book offers an essential overview of brain, head and neck, and spine imaging. Over the last few years, there have been considerable advances in this area, driven by both clinical and technological developments. Written by leading international experts and teachers, the chapters are disease-oriented and cover all relevant imaging mo...
SPSS for Starters and 2nd Levelers
For medical and health workers this book is a must-have, because statistical methods in these fields are vital, and no equivalent work is available. For medical and health students this is equally true.A unique point is its low threshold, textually simple and at the same time full of self-assessment opportunities. Other unique points are the succin...
Physical Modeling in MATLAB
Modeling and simulation are powerful tools for explaining the world, making predictions, designing things that work, and making them work better. Learning to use these tools can be difficult; this book is my attempt to make the experience as enjoyable and productive as possible. By reading this book - and working on the exercises - you will lear...
Stories from Quechan Oral Literature
The Quechan are a Yuman people who have traditionally lived along the lower part of the Colorado River in California and Arizona. They are well known as warriors, artists, and traders, and they also have a rich oral tradition. The stories in this volume were told by tribal elders in the 1970s and early 1980s. The eleven narratives in this volume ta...
Defensive Database Programming with SQL Server
Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment. Too often as deve...
RESTful Web Services
You've built web sites that can be used by humans. But can you also build web sites that are usable by machines? That's where the future lies, and that's what RESTful Web Services shows you how to do. The World Wide Web is the most popular distributed application in history, and Web services and mashups have turned it into a powerful...
Producing Open Source Software
The corporate market is now embracing free, "open source" software like never before, as evidenced by the recent success of the technologies underlying LAMP (Linux, Apache, MySQL, and PHP). Each is the result of a publicly collaborative process among numerous developers who volunteer their time and energy to create better software. The...
802.11ac: A Survival Guide
The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring. Author Matthew Gast - an industry expert who led the development of ...
Eloquent JavaScript
JavaScript lies at the heart of almost every modern web application, from social apps like Twitter to browser-based game frameworks like Phaser and Babylon. Though simple for beginners to pick up and play with, JavaScript is a flexible, complex language that you can use to build full-scale applications. This much anticipated and thoroughly revis...
Signal Computing
In this book, you will learn how digital signals are captured, represented, processed, communicated, and stored in computers. The specific topics we will cover include: physical properties of the source information (such as sound or images), devices for information capture (microphones, cameras), digitization, compression, digital signal representa...
The Elements of Data Analytic Style
The dramatic change in the price and accessibility of data demands a new focus on data analytic literacy. This book is intended for use by people who perform regular data analyses. It aims to give a brief summary of the key ideas, practices, and pitfalls of modern data analysis. One goal is to summarize in a succinct way the most common difficultie...
Gaming Rhythms
This book is about digital games, the people who play digital games, and how they play them. This poses a large problem: even when discussing one game, each instance of play is different. Combine this with the thousands of digital games, and the millions of players, and it is apparent that the number of individual instances of game play is unfathom...
Invent Your Own Computer Games with Python
Invent Your Own Computer Games with Python teaches you how to program in the Python language. Each chapter gives you the complete source code for a new game, and then teaches the programming concepts from the examples. Games include Guess the Number, Hangman, Tic Tac Toe, and Reversi. This book also has an introduction to making games with 2D graph...
Why Do We Quote?
Quoting is all around us. But do we really know what it means? How do people actually quote today, and how did our present systems come about? This book brings together a down-to-earth account of contemporary quoting with an examination of the comparative and historical background that lies behind it and the characteristic way that quoting links pa...
Storytelling in Northern Zambia
Storytelling plays an important part in the vibrant cultural life of Zambia and in many other communities across Africa. This innovative book provides a collection and analysis of oral narrative traditions as practiced by five Bemba-speaking ethnic groups in Zambia. The integration of newly digitalised audio and video recordings into the text enabl...
Frontier Encounters
China and Russia are rising economic and political powers that share thousands of miles of border. Yet, despite their proximity, their practical, local interactions with each other - and with their third neighbour Mongolia - are rarely discussed. The three countries share a boundary, but their traditions, languages and worldviews are remarkably dif...

1 ... 6 7 8 9 10 ... 17