This book presents a person-centered exploration of student profiles, using variables related to motivation to do school mathematics derived from the IEA's Trends in International Mathematics and Science Study (TIMSS) data. Statistical cluster analysis is used to identify groups of students with similar motivational profiles, across grades and...
This text is a practical guide for linguists, and programmers, who work with data in multilingual computational environments. We introduce the basic concepts needed to understand how writing systems and character encodings function, and how they work together at the intersection between the Unicode Standard and the International Phonetic Alphabet. ...
This book contains a structured collection of complete solutions of all significant axially symmetric contact problems. It provides solutions for classical profiles such as the sphere, cone or flat cylindrical punch as well as a multitude of other technically relevant shapes, e.g. the truncated cone, the worn sphere, rough profiles, hollow cylinder...
Network Virtualization "provides virtual networks to virtual machines similar to how server virtualization provides virtual machines to the operating system. Network Virtualization decouples virtual networks from the physical network infrastructure and removes the constraints and limitations of VLANs and hierarchical IP address assignment from...
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall o...
This open book describes the Reading Success project, in which a 5-step, assessment-to- intervention process, based on the Simple View of Reading, was used within a primary school setting in Australia to better support those students who struggle with reading. It provides an easily accessible overview of each step of the process involved in impleme...
This book looks at the migration of Southern European EU citizens (from Portugal, Spain, Italy, Greece) who move to Northern European Member States (Belgium, France, Germany, United Kingdom) in response to the global economic crisis.Its objective is twofold. First, it identifies the scale and nature of this new Southern European emigration and exam...
Architecture and the Novel under the Italian Fascist Regime discusses the relationship between the novel and architecture during the Fascist period in Italy (1922-1943). By looking at two profoundly diverse aesthetic phenomena within the context of the creation of a Fascist State art, Billiani and Pennacchietti argue that an effort of construction,...
The overarching aim of this book is to present self-contained theory and algorithms for investigation and prediction of electric demand peaks. A cross-section of popular demand forecasting algorithms from statistics, machine learning and mathematics is presented, followed by extreme value theory techniques with examples.In order to achieve carbon t...
This book uses a critical sociological perspective to explore contemporary ways of reformulating the governance of crime through genetics. Through the lens of scientific knowledge and genetic technology, Machado and Granja offer a unique perspective on current trends in crime governance. They explore the place and role of genetics in criminal justi...
This book deals with one the most interesting aspects of human life - the search for meaning. It discusses how the science of semiotics is equipped to provide insight on what meaning is and how we produce it. Why is it that certain people routinely put their survival at risk by smoking? Why is it that some women make locomotion difficult for themse...
This text finally collects all the introductory aspects of beer brewing science into one place for undergraduate brewing science courses. This expansive and detailed work is written in conversational style, walking students through all the brewing basics from the origin and history of beer to the brewing process to post-brew packaging and quality c...
Welcome to Writing Unleashed, designed for use as a book in first-year college composition programs, written as an extremely brief guide for students, jam-packed with teachers' voices, students' voices, and engineered for fun....
The PowerShell Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Previously, artificial neural networks have been used to capture only the informal properties of music. However, cognitive scientist Michael Dawson found that by training artificial neural networks to make basic judgments concerning tonal music, such as identifying the tonic of a scale or the quality of a musical chord, the networks revealed formal...
This open book explores how biometric data is increasingly flowing across borders in order to limit, control and contain the mobility of selected people, namely criminalized populations. It introduces the concept of bio-bordering, using it to capture reverse patterns of bordering and ordering practices linked to transnational biometric data exchang...
This open book provides worldwide examples demonstrating the importance of the interplay between demography and disasters in regions and spatially. It marks an advance in practical and theoretical insights for understanding the role of demography in planning for and mitigating impacts from disasters in developed nations.
Both slow onset (like the ...
This open access book is the first published guide about how to analyse data produced by the EQ-5D, one of the most widely used Patient Reported Outcomes questionnaires world wide. The authors provide practical, clear and comprehensive guidance in five concise chapters. Following an overview of the EQ-5D and its analysis, we describe how the questi...
The Business of Plant Breeding is the result of a study on demand-led plant variety design for markets in Africa, sharing best practices from private and public sector breeding programmes worldwide that are applicable to improving tropical crops in Africa.
Beginning with an overview of the principles of demand-led plant breeding, the book then d...
To build a house, it's necessary to go through different phases before stacking the first brick. The architect needs to pay attention to everything, drawing all the technical details and documenting the architecture design.
After the drawings are finished, the construction materials need to be chosen and things like the brick type, the insu...
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...