Marknadens största urval
Snabb leverans

Böcker utgivna av River Publishers

Filter
Filter
Sortera efterSortera Populära
  • - Urban experiences in Southern Europe
     
    587

    This book describes Spatial planning, urbanization, sustainable development, economic crisis, Mediterranean Europe.

  • av Michael Burch
    697 - 1 557

    Visualization and visual analytics are powerful concepts for exploring data from various application domains. The endless number of possible parameters and the many ways to combine visual variables as well as algorithms and interaction techniques create lots of possibilities for building such techniques and tools.The major goal of those tools is to include the human users with their tasks at hand, their hypotheses, and research questions to provide ways to find solutions to their problems or at least to hint them in a certain direction to come closer to a problem solution. However, due to the sheer number of design variations, it is unclear which technique is suitable for those tasks at hand, requiring some kind of user evaluation to figure out how the human users perform while solving their tasks.The technology of eye tracking has existed for a long time; however, it has only recently been applied to visualization and visual analytics as a means to provide insights to the users' visual attention behavior. This generates another kind of dataset that has a spatio-temporal nature and hence demands for advanced data science and visual analytics concepts to find insights into the recorded eye movement data, either as a post process or even in real-time.This book describes aspects from the interdisciplinary field of visual analytics, but also discusses more general approaches from the field of visualization as well as algorithms and data handling. A major part of the book covers research on those aspects under the light and perspective of eye tracking, building synergy effects between both fields - eye tracking and visual analytics - in both directions, i.e. eye tracking applied to visual analytics and visual analytics applied to eye tracking data. Technical topics discussed in the book include: * Visualization; * Visual Analytics; * User Evaluation; * Eye Tracking; * Eye Tracking Data Analytics;Eye Tracking and Visual Analytics includes more than 500 references from the fields of visualization, visual analytics, user evaluation, eye tracking, and data science, all fields which have their roots in computer science.Eye Tracking and Visual Analytics is written for researchers in both academia and industry, particularly newcomers starting their PhD, but also for PostDocs and professionals with a longer research history in one or more of the covered research fields. Moreover, it can be used to get an overview about one or more of the involved fields and to understand the interface and synergy effects between all of those fields. The book might even be used for teaching lectures in the fields of information visualization, visual analytics, and/or eye tracking.

  • av Omar A. Ponce
    681 - 1 431

    This book provides an accessible introduction to the philosophy of educational research. A historical-philosophical journey presents the development of research methods from their origins to the present day. In addition, the book reflects on how research methods have influenced scientific effectiveness. Throughout, the book covers the principal things that need to be known today about the theory and practice of educational research, its epistemological bases, and its development as a discipline within scientific knowledge. The historical events that defined both the methodological evolution and the current situation of contemporary educational research are described to enable its understanding.This book provides an accessible introduction to the philosophy of educational research. A historical-philosophical journey presents the development of research methods from their origins to the present day.. It can also be used as didactic material for classroom discussions on educational research, educational philosophy, and current controversies in education. Its usefulness reaches the social sciences, humanities, and experimental sciences in all areas related to teaching and training. The basis of educational research is exposed, both in its concepts or philosophical visions and methodologies, which ultimately define what education means today.

  • av Marcelo Sampaio de (Institute of Advanced Studies in Communications Senai Cimatec University Center Alencar
    1 541

    The book describes the evolution of economic theory, considering historical, political and scientific perspectives. The main economic concepts are presented, including microeconomics, macroeconomics, econometrics, privatization, taxes, tariffs, the concept of currencies, stock markets, international transactions, and economic policies.

  • av M.A. Jabbar
    681 - 1 711

    The signal processing (SP) landscape has been enriched by recent advances in artificial intelligence (AI) and machine learning (ML), yielding new tools for signal estimation, classification, prediction, and manipulation. Layered signal representations, nonlinear function approximation and nonlinear signal prediction are now feasible at very large scale in both dimensionality and data size. These are leading to significant performance gains in a variety of long-standing problem domains like speech and Image analysis. As well as providing the ability to construct new classes of nonlinear functions (e.g., fusion, nonlinear filtering).This book will help academics, researchers, developers, graduate and undergraduate students to comprehend complex SP data across a wide range of topical application areas such as social multimedia data collected from social media networks, medical imaging data, data from Covid tests etc. This book focuses on AI utilization in the speech, image, communications and yirtual reality domains.

  • av Bernard F. Kolanowski
    821 - 2 027

  • av Richard Vaillencourt
    697 - 1 711

    Updated with new material, this book shares the author's secrets for simplifying complex energy calculations, and shows you how to use these time-saving methods. It shows you how to cut through the maze using innovative decision-making tools to determine whether you should invest real time and money for developing details of a project being considered. There is information covered on simplified thermodynamics that gives you a blueprint for controlling the building's energy consumption. Key topics covered include the walk-through audit, pumps & fans VFD, high efficiency motors, insulation, fuel switching, heat recovery, HVAC, air compressor, "e;energy myths and magic"e;. Each chapter has "e;Richard's Retrofit Rules"e; and anecdotal experience in the retrofit. There is a summary of energy calculations given by category, plus a discussion of performance guarantees that helps a building manager decide which ESCO can best deliver on their promises of energy savings.

  • av Albert Thumann & D. Paul Mehta
    2 367

  •  
    1 361

    The book discusses the essential elements of requirements engineering applied to Safety Critical Systems such as the relationship between safety/hazard analysis and requirements specification, a balance between conservative and agile methodologies, the role of requirements engineering in safety cases, and requirements engineering maturity model.

  • av Ana Isabel Veloso
    681 - 1 431

    Given the increase in the ageing population and the evolvement of the Human-Computer Interaction field to a much more humanistic approach, debate is ongoing about designing technology-enabled products for active ageing and healthy lifestyles. Indeed, the mainstream game industry has been challenged with the emergence of an older target group, the advancements in gamification and the proliferation of SMART devices.Previous experience in the field has revealed that for many older adult gamers, games had a therapeutic effect through them being both cognitively challenged and rewarded. However it has also revealed that the gaming industry was not fulfilling their other motivations and accessibility needs.Furthermore, research to date has focused on the physical and cognitive effects of video games in the aging process. Up to now, the use of other active ageing dimensions that go beyond the health domains (i.e. sense of security, and participation in society) in games addressed to this target group remain unexplored.This book differs from current books on the market by focusing on games and the main implications to design for active ageing in terms of the market perspective, the information and communication society, behavioral design, mobility, urban and city planning, accessibility and assessment.

  •  
    1 547

    The book is centrally focused on human computer Interaction and how sensors within small and wide groups of Nano-robots employ Deep Learning for applications in industry. It covers a wide array of topics that are useful for researchers and students to gain knowledge about AI and sensors in nanobots.

  • av Gregory P. Bierals
    681 - 1 361

  • av Gregory P. Bierals
    681 - 1 647

    An overcurrent is caused by a short-circuit, ground-fault, or an overload.A short-circuit may be hundreds or even thousands of times above the normal operating current. This type of fault may be an arcing fault between ungrounded conductors or between an ungrounded conductor and a grounded (usually, a neutral) conductor, a line-to-line arcing fault may produce a current of 74% of a 3-phase bolted fault. A line-to-neutral arcing fault will be somewhat less.A line-to-line bolted fault, the equivalent, of the conductors bolted together, may be up to 100% of the available short-circuit current.A line-to-neutral bolted fault may be in excess of 100% of the 3-phase bolted fault at the source, but considerably less downstream.A ground-fault, that is, the equivalent of a connection between an ungrounded conductor and the equipment grounding system, will produce a current that may be 38% or higher of the 3-phase bolted fault current. These types of faults are typically arcing faults which normally are intermittent in nature. That is, they strike and restrike over time and may produce a short-circuit fault due to insulation damage.Once again, a line-to-equipment ground fault near the source may produce a fault current of over 100% of the 3-phase bolted fault, but considerably less downstream.An overload typically ranges from one to six times the normal current, and are normally caused by motor starting currents or transformer magnetizing currents. These conditions are of such short duration that the circuit components are not damaged.This book has a detailed analysis of these types of faults, along with explanations and examples of the various types of overcurrent protective devices to assure proper protection.This volume has extensive information on the application of overcurrent protection for conductors and equipment. The reader will be able to calculate fault currents as well as establishing the short-circuit withstand rating of conductor insulation and to determine the appropriate type of overcurrent devices based on circuit conditions.In addition, determining ground-fault currents for the purpose of selecting the proper size of equipment grounding conductors to establish an effective ground-fault current path is discussed in detail.Readership - Anyone involved with the design of overcurrent protection for electrical distribution systems from the system source to the electrical utilization equipment. The emphasis is placed on the design of the overcurrent protection for specific installations to assure proper protection for the circuit components regardless of the type of fault encountered.

  • av Gregory P. Bierals
    1 647

    The first concern and the most important reason for proper grounding techniques are to protect people from the effects of ground-faults and lightning. Creating an effective ground-fault current path to assure the operation of overcurrent protective devices on solidly grounded systems and to limit the voltage-rise on equipment frames during fault condition is of paramount importance.The next concern is building and equipment protection. In this case, providing low impedance bonding and grounding paths between the system source, the electrical service and downstream equipment will serve to limit hazardous voltages due to faults and especially, lightning, A low resistance-to-ground system will serve to limit the voltage rise on systems and equipment.But of equal importance is the length of the grounding electrode conductor. It is critical to limit the length of this conductor due to the increased impedance of lightning currents.And finally, a properly installed grounding system will minimize the effects of electrical noise on sensitive circuits and stabilize the voltage-to-ground during normal operation.This volume has extensive information on grounding electrical systems and equipment.This information includes the following topics:System GroundingEquipment GroundingBondingThe Grounding Electrode SystemSolidly Grounded SystemsImpedance Grounded SystemsGrounding Separately-Derived SystemsCalculating Ground-Fault CurrentsConductor Insulation Withstand RatingsConductor Fusing or Melting CurrentsFunctional GroundingLightning ProtectionReadership: Anyone involved with designing a proper grounding system that will serve to protect people and equipment from the effects of ground faults and lightning. And to design a proper grounding system for special applications, including Solar and Wind Powered Systems.

  • av K.R. Rao
    681 - 1 357

    While the JPEG image standard was developed more than 25 years ago, it is still dominant in terms of image formation, manipulation and transmission over the internet and other media. As technology advances, new demands have arisen for the efficient transmission and storage of images causing other formats to emerge. Over the years, several extensions such as, JPEGLS, JPEG2K, JPEGXT, JPEGXR, JPEGXS and JPEG Pleno, have been added, constructing a series of standards for the compression and transmission of images. This book is the first to bring together most of the series of JPEG standards in a book.This book covers the descriptions of the JPEG standards and gives the reader an overview of the latest advances in the standards of the Joint Photographic Experts Group.Topics discussed include: * JEPG;* JPEG XR;* JPEG XT;* JPEG 2000;* JPEG XS;* JPEG Pleno;* JPEG AIC;* JPEG LS;* JPEG XL;* JPSearch;* JPEG Systems;* JBIG

  •  
    1 431

    The book presents unexplored issues of economic inequality, including case studies of various countries. This book book examines the major parameters of the socio-economic issues of inequality and focuses on the key economic issues of inequality, namely, income and wealth distribution, equity & equality of outcome, and equality of opportunities.

  • av Jiajia Liu
    681 - 1 437

    Intelligent and Connected Vehicles (ICVs) are moving into the mainstream of the worldwide automotive industry. A lot of advanced technologies, like artificial intelligence, big data, millimeter wave radar, LiDAR and high-definition camera based real-time environmental perception, etc., are increasingly being applied in ICVs, making them more intelligent and connected with devices surrounding the vehicles. However, although the versatile connection and information exchange among ICVs, external devices and human beings provides vehicles with a better and faster perception of surrounding environments and a better driving experience for users, they also create a series of intrusion portals for malicious attackers which threaten the safety of drivers and passengers. This book is concerned with the recognition and protection against such threats.Security for ICVs includes information across the fields of automobile engineering, artificial intelligence, computer, microelectronics, automatic control, communication technology, big data, edge/cloud computing and others. This book comprehensively and systematically introduces security threats to ICVs coming from automotive technology development, on-board sensors, vehicle networking, automobile communications, intelligent transportation, big data, cloud computing, etc. Then, through discussion of some typical automobile cyber-attack cases studies, readers will gain a deeper understanding of the working principle of ICVs, so that they can test vehicles more objectively and scientifically. In this way they will find the existence of vulnerabilities and security risks and take the corresponding protective measures to prevent malicious attacks.

  •  
    1 447

    This collection of edited papers gives an integrated understanding of the question of "why is society unequal"? This book is aimed at those stakeholders, who want to make or contribute to change and build an undivided, socially inclusive society, and to those who want to contribute to empowering society in the Twenty-First century.

  •  
    1 431

    This book provides the readers with the latest advances and insights in the ever-expanding field of Cardio-Oncology.

  •  
    1 357

    The book describes projects which help in developing cybersecurity solution architectures and the use of the right tools from the opensource software domain. These projects are covered in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment

  •  
    1 511

    The aim of this book is to provide readers and researchers with timely and accurate knowledge on stem cell biology and regenerative medicine. This book will cover many topics in the field and is based on conferences given by recognized scientists involved in the international master course on stem cell biology at Sorbonne Universite in Paris.

  • av Oleksandr Nakonechnyi
    1 357

    This monograph is devoted to the construction of optimal estimates of values of linear functionals on solutions to Cauchy and two-point boundary value problems for systems of linear first-order ordinary differential equations, from indirect observations which are linear transformations of the same solutions perturbed by additive random noises. It is assumed that right-hand sides of equations and boundary data as well as statistical characteristics of random noises in observations are not known and belong to certain given sets in corresponding functional spaces. This leads to the necessity of introducing the minimax statement of an estimation problem when optimal estimates are defined as linear, with respect to observations, estimates for which the maximum of mean square error of estimation taken over the above-mentioned sets attains minimal value. Such estimates are called minimax or guaranteed estimates. It is established that these estimates are expressed explicitly via solutions to some uniquely solvable linear systems of ordinary differential equations of the special type. The authors apply these results for obtaining the optimal estimates of solutions from indirect noisy observations.Similar estimation problems for solutions of boundary value problems for linear differential equations of order n with general boundary conditions are considered. The authors also elaborate guaranteed estimation methods under incomplete data of unknown right-hand sides of equations and boundary data and obtain representations for the corresponding guaranteed estimates. In all the cases estimation errors are determined.

  • av Professor Kaveh (Worcester Polytechnic Institute Pahlavan
    1 431

    The book describes important networking standards, classifying their underlying technologies in a logical manner and gives detailed examples of successful applications. The book provides examples with supporting MATLAB codes and hands-on projects.

  • av Dr. Subhendu Kumar (Principal Pani
    1 447

    This book introduces the state-of-the-art trends and advances in the use of Machine Learning in Cloud and Big Data Analytics. The book will describe the concepts necessary to understand current Machine Learning issues, challenges and possible solutions as well as upcoming trends in Big Data Analytics.

  • av James C. Bezdek
    781 - 1 771

    The availability of packaged clustering programs means that anyone with data can easily do cluster analysis on it. But many users of this technology don't fully appreciate its many hidden dangers. In today's world of "e;grab and go algorithms,"e; part of my motivation for writing this book is to provide users with a set of cautionary tales about cluster analysis, for it is very much an art as well as a science, and it is easy to stumble if you don't understand its pitfalls. Indeed, it is easy to trip over them even if you do! The parenthetical word usually in the title is very important, because all clustering algorithms can and do fail from time to time.Modern cluster analysis has become so technically intricate that it is often hard for the beginner or the non-specialist to appreciate and understand its many hidden dangers. Here's how Yogi Berra put it, and he was right:In theory there's no difference between theory and practice. In practice, there is ~Yogi BerraThis book is a step backwards, to four classical methods for clustering in small, static data sets that have all withstood the tests of time. The youngest of the four methods is now almost 50 years old:Gaussian Mixture Decomposition (GMD, 1898)SAHN Clustering (principally single linkage (SL, 1909))Hard c-means (HCM, 1956, also widely known as (aka) "e;k-means"e;)Fuzzy c-means (FCM, 1973, reduces to HCM in a certain limit)The dates are the first known writing (to me, anyway) about these four models. I am (with apologies to Marvel Comics) very comfortable in calling HCM, FCM, GMD and SL the Fantastic Four.Cluster analysis is a vast topic. The overall picture in clustering is quite overwhelming, so any attempt to swim at the deep end of the pool in even a very specialized subfield requires a lot of training. But we all start out at the shallow end (or at least that's where we should start!), and this book is aimed squarely at teaching toddlers not to be afraid of the water. There is no section of this book that, if explored in real depth, cannot be expanded into its own volume. So, if your needs are for an in-depth treatment of all the latest developments in any topic in this volume, the best I can do - what I will try to do anyway - is lead you to the pool, and show you where to jump in.

  • av Hector J. De Los (NanoMEMS Research Santos
    781 - 1 457

    This book introduces the field by addressing its fundamental principles, proceeding from its very beginnings, up to today's emerging technologies related to the fifth-generation wireless systems (5G), Multi-Input Multiple Output (MIMO) connectivity, and Aerospace/Electronic Warfare Radar. The tone is tutorial.

  • av SINGH NEGI CHEN
    1 547

    This book examines the key aspects that will define future sustainable energy systems: biofuels, green nanomaterials and the production of bioethanol and bio-hydrogen from bio-waste. Bio-based fuels are the future energy carriers for internal combustion engines as they have lower environmental impact and higher efficiency. The book clearly illustrates the requirement for a unified engineering approach based on solid mathematical and engineering principles. Aside from the ecological advantages, support for sustainable energy can help the socioeconomic situation of developing countries by providing a consistent supply of new energy along with the generation of new job opportunities. The sustainable energy applications and existing contextual investigations provide useful guidance for the broad comprehension of the significance of sustainable energy.Technical topics discussed in the book include: - Thermochemical Conversion process; - Catalytic conversion process;- Rankine cycle;- Nanomaterials;

  • av Bipin Singh Koranga
    1 427

    Special functions are mathematical functions that have established names and notations due to their importance in mathematical analysis, functional analysis, geometry, physics, or other applications. This short text gives clear descriptions and explanations of the Gamma function, the Probability Integral and its related functions, Spherical Harmonics Theory, The Bessel function, Hermite polynomials and Laguerre polynomials. Each chapter finishes with a description of how the function is most commonly applied and a set of examples for the student to work through.

  •  
    1 547

    This book "Advanced Applications of Computational Mathematics" covers multidisciplinary studies containing advanced research in the field of computational and applied mathematics. The book includes research methodology, techniques, applications, and algorithms.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.