Recent Trends in Algebraic Development Techniques
This book constitutes the thoroughly refereed post-conference proceedings of the 27th IFIP WG 1.3 International Workshop on Algebraic Development Techniques, WADT 2024, held in Enschede, The Netherlands, on July 8, 2024. The 6 full papers presented in this volume were carefully reviewed and selected from 11 submissions. The contributed presentations covered a wide range of topics on the algebraic approach to system specification: from foundations of algebraic-specification languages to institutions and knowledge representation, to graph transformations, rewrite rules, process algebra, and bialgebraic frameworks, to many-logics modal systems and quantum process calculi, and to several applications to code synthesis and maintainability.
IB Diploma Programme Computer Science 2025 Student Book
Developed in collaboration with the International Baccalaureate (IB) and aligned with the 2025 subject guide, this comprehensive Course Book provides thorough support for key concepts, theories, and essential skills. Authored by experienced IB educators, examiners, and curriculum developers, the course book ensures full syllabus coverage for both Standard Level (SL) and Higher Level (HL), offering high-quality content that balances theoretical knowledge with practical skill development.
Integrated Circuit Design
This book provides a structured and comprehensive pathway through the complexities of Electronic Design Automation (EDA) tools and processes. It focuses on OpenLane and Caravel EDA tools, due to their current major role in the open-source IC design ecosystem. OpenLane provides a robust and flexible platform that automates the entire digital design flow from Register Transfer Level (RTL) to Graphic Data System II (GDSII), making it an ideal tool for teaching and learning the physical design process. Caravel, on the other hand, serves as an open-source System on a Chip (SoC) platform, allowing designers to integrate and test their designs in a versatile, real-world environment. It complements OpenLane by enabling users to package and validate their designs, bridging the gap between theoretical knowledge and practical implementation. Together, these tools provide a way to understand the full tape-out process in a way that is accessible to students, researchers, and professionals alike.
Conceptualizing Digital Responsibility for the Information Age
Video Based Machine Learning for Traffic Intersections
Video Based Machine Learning for Traffic Intersections describes the development of computer vision and machine learning-based applications for Intelligent Transportation Systems (ITS) and the challenges encountered during their deployment. This book presents several novel approaches, including a two-stream convolutional network architecture for vehicle detection, tracking, and near-miss detection; an unsupervised approach to detect near-misses in fisheye intersection videos using a deep learning model combined with a camera calibration and spline-based mapping method; and algorithms that utilize video analysis and signal timing data to accurately detect and categorize events based on the phase and type of conflict in pedestrian-vehicle and vehicle-vehicle interactions.The book makes use of a real-time trajectory prediction approach, combined with aligned Google Maps information, to estimate vehicle travel time across multiple intersections. Novel visualization software, designed by the authors to serve traffic practitioners, is used to analyze the efficiency and safety of intersections. The software offers two modes: a streaming mode and a historical mode, both of which are useful to traffic engineers who need to quickly analyze trajectories to better understand traffic behavior at an intersection.Overall, this book presents a comprehensive overview of the application of computer vision and machine learning to solve transportation-related problems. Video Based Machine Learning for Traffic Intersections demonstrates how these techniques can be used to improve safety, efficiency, and traffic flow, as well as identify potential conflicts and issues before they occur. The range of novel approaches and techniques presented offers a glimpse of the exciting possibilities that lie ahead for ITS research and development.Key Features: Describes the development and challenges associated with Intelligent Transportation Systems (ITS) Provides novel visualization software designed to serve traffic practitioners in analyzing the efficiency and safety of an intersection Has the potential to proactively identify potential conflict situations and develop an early warning system for real-time vehicle-vehicle and pedestrian-vehicle conflicts
The Smart Life Revolution
This book explores the integration of Artificial Intelligence (AI) across areas such as IoT, big data, healthcare, business, economics, and security, and improving the quality of life (QoL) in smart cities today.By looking in depth at the different application areas of AI, the reader learns about the broad and impactful ways AI is transforming our world, its profound influence in enhancing service efficiency, personalization, accessibility, and fostering both scientific and social advancement. The editors consider the importance of bridging theory and practice by offering a practical understanding of how key AI technologies can be applied in real-world scenarios for QoL. By covering both foundational concepts and advanced applications with case studies and practical examples, this approach ensures the reader obtains a comprehensive understanding of the technologies and their impact. An innovation mindset is emphasized with discussion about the challenges, opportunities, future trends, and potential research directions to prepare readers for ongoing technological advancements. The book takes an interdisciplinary approach by integrating knowledge from computer science, engineering, and social sciences, to offer a holistic view of technology's role in society.This book serves as a valuable resource for both undergraduate and postgraduate students in the study of AI applications in society. The book may be used for researchers and communities to identify the different challenges associated with key technologies for building new applications for improving quality of lives in smart cities.
Mastering CyberSecurity Defense
DESCRIPTION Cyber threats are evolving unprecedentedly, making CyberSecurity defense a crucial skill for professionals and organizations. This book is a comprehensive guide designed to equip readers with the knowledge, strategies, and best practices to secure digital assets, mitigate risks, and build resilient security frameworks.It covers the fundamental to advanced aspects of CyberSecurity, including threat landscapes, infrastructure security, identity and access management, incident response, legal considerations, and emerging technologies. Each chapter is structured to provide clear explanations, real-world examples, and actionable insights, making it an invaluable resource for students, IT professionals, security leaders, and business executives. You will learn about various Cyber threats, attack vectors, and how to build a secure infrastructure against zero-day attacks.By the end of this book, you will have a strong grasp of CyberSecurity principles, understanding threats, crafting security policies, and exploring cutting-edge trends like AI, IoT, and quantum computing. Whether you are entering the Cyber domain, advancing your career, or securing your organization, this book will be your trusted guide to navigating the evolving Cyber landscape.WHAT YOU WILL LEARN● Understand the evolving Cyber threat landscape and learn how to identify, assess, and mitigate security risks in real-world scenarios.● Build secure infrastructures, implement access controls, and strengthen network defense mechanisms.● Design and enforce CyberSecurity policies, ensuring compliance with industry standards and regulations.● Master incident response strategies, enabling them to effectively detect, analyze, and contain security breaches.● Design secure networks, manage insider threats, conduct regulatory audits, and have a deep understanding of data protection techniques.WHO THIS BOOK IS FORThis book is for anyone interested in CyberSecurity, from beginners to professionals. Basic IT knowledge is helpful, but no CyberSecurity expertise is required. Learn essential defense strategies and practical insights to combat evolving Cyber threats.
Concept of IoT
1.3k+ MCQ with Explanation of IoT (Internet of Things) for all Universities, Colleges and Schools Students. This book is also very useful for all competitive exams . Table of content Chapters Page NoIoT_Basics............................................................................................................ 1IoT_Architecture................................................................................................. 22IoT Hardware....................................................................................................... 46Prototyping Embedded Devices........................................................................ 54Software Programming & IoT Devices............................................................ 77IoT Sensors........................................................................................................... 90Internet Principles.............................................................................................. 117IoT Networking................................................................................................... 160BigData Cloud - based IoT Analytics............................................................... 168IoT Security and Hardware............................................................................... 181Fog Computing................................................................................................... 188IoT Cloud............................................................................................................. 196Cloud Collaboration Framework...................................................................... 211Communicating with IoT Devices..................................................................... 223OSS Web Infrastructure for Managing IoT Resources in the Cloud........... 234Going Parallel, Handling Actuator and Sensor................................................ 242Designing IoT....................................................................................................... 254Emerging Technology and Toy Designs, IoT Robustness and Reliability..... 270
Concept of Software Engineering
1.2k+ MCQ with Explanation of Software Engineering for all Universities, Colleges and Schools Students. This book is also very useful for all competitive exams .Table of Contents Units Page NumbersIntroduction to Software Engineering............................ 1Software Processes.................................................. 23Requirement Engineering.......................................... 40Software Modeling.................................................. 61Software Evolution.................................................. 65Dependability and Security........................................ 70Software Design..................................................... 82Software Metrics..................................................... 96Software Management...............................................106 Software Maintenance................................................145Architectural Design..................................................160Design and Implementation..........................................168Advanced Software Engineering....................................191Software Engineering Types.........................................217Software Reliability and Fault Tolerance..........................232Software Testing and Quality Management........................240
Computer Networks
Advanced Networking Protocols: Dive into advanced networking protocols and technologies, including multi-protocol label switching (MPLS), border gateway protocol (BGP), IPv6, virtual private networks (VPNs), and advanced transport layer protocols. The volume provides in-depth coverage of these protocols' design, operation, and implementation.Network Security and Cryptography: Explore comprehensive topics on network security, including cryptographic techniques, secure communication protocols (e.g., SSL/TLS, IPsec), firewalls, intrusion detection and prevention systems, and the principles of secure network design. The volume addresses contemporary security challenges and best practices for safeguarding network infrastructure.Wireless and Mobile Networks: Cover the concepts and technologies behind wireless and mobile networks, including Wi-Fi, cellular networks (e.g., LTE, 5G), and mobile IP. The volume explores the challenges and solutions related to mobility, handoff, interference management, and spectrum allocation in wireless communications.Network Management and Monitoring: Examine network management frameworks, tools, and protocols, including Simple Network Management Protocol (SNMP), network monitoring, fault management, and performance monitoring. The volume also addresses automation in network management, with a focus on software-defined networking (SDN) and network function virtualization (NFV).
Computer Networks
Advanced Networking Protocols: Dive into advanced networking protocols and technologies, including multi-protocol label switching (MPLS), border gateway protocol (BGP), IPv6, virtual private networks (VPNs), and advanced transport layer protocols. The volume provides in-depth coverage of these protocols' design, operation, and implementation.Network Security and Cryptography: Explore comprehensive topics on network security, including cryptographic techniques, secure communication protocols (e.g., SSL/TLS, IPsec), firewalls, intrusion detection and prevention systems, and the principles of secure network design. The volume addresses contemporary security challenges and best practices for safeguarding network infrastructure.Wireless and Mobile Networks: Cover the concepts and technologies behind wireless and mobile networks, including Wi-Fi, cellular networks (e.g., LTE, 5G), and mobile IP. The volume explores the challenges and solutions related to mobility, handoff, interference management, and spectrum allocation in wireless communications.Network Management and Monitoring: Examine network management frameworks, tools, and protocols, including Simple Network Management Protocol (SNMP), network monitoring, fault management, and performance monitoring. The volume also addresses automation in network management, with a focus on software-defined networking (SDN) and network function virtualization (NFV).
The Art of Systems Architecting
The Art of Systems Architecting, Fourth Edition, provides structured heuristics to improve the least structured, most art-like elements of systems design. It offers unique techniques to bridge the difference between scientific engineering and qualitative design along with comprehensive methods for combining architectural design with digital engineering. This book illustrates how to go from model-based systems architecture to model-based systems engineering and includes case studies of good and bad architectural decision-making in major systems.Changes to this edition include materials on architecture processes, architecture description frameworks, and integration with model-based systems engineering (MBSE) and digital engineering. The publication of the ANSI/IEEE 1471 and ISO/IEC 42010 standards on architecture description has provided common vocabulary and organizing methods for documenting architectures. This edition provides a practical application of these standards in architecting and integrating their concepts with a simple process framework. The rise of MBSE and digital engineering tools is in the process of revolutionizing the development of complex systems. The emphasis has been on detailed design descriptions and powerful analysis methods (for example, digital twins). Architects can make effective use of these methods and tools as well, and this new edition provides an integrated set of heuristics and modeling methods to do so. There are many other improvements and additions included to bring this textbook up to date.This book can be used as a reference book for engineers and managers involved in creating new systems, people responsible for developing mandated architecture descriptions, software architects, system architects, and systems engineers, or as a textbook in graduate engineering courses.Exercises are interspersed throughout the text, with some designed for self-testing and understanding and others intended to provide opportunities for long-term study and further exploration of the subject.
The Smart Life Revolution
This book explores the integration of Artificial Intelligence (AI) across areas such as IoT, big data, healthcare, business, economics, and security, and improving the quality of life (QoL) in smart cities today.By looking in depth at the different application areas of AI, the reader learns about the broad and impactful ways AI is transforming our world, its profound influence in enhancing service efficiency, personalization, accessibility, and fostering both scientific and social advancement. The editors consider the importance of bridging theory and practice by offering a practical understanding of how key AI technologies can be applied in real-world scenarios for QoL. By covering both foundational concepts and advanced applications with case studies and practical examples, this approach ensures the reader obtains a comprehensive understanding of the technologies and their impact. An innovation mindset is emphasized with discussion about the challenges, opportunities, future trends, and potential research directions to prepare readers for ongoing technological advancements. The book takes an interdisciplinary approach by integrating knowledge from computer science, engineering, and social sciences, to offer a holistic view of technology's role in society.This book serves as a valuable resource for both undergraduate and postgraduate students in the study of AI applications in society. The book may be used for researchers and communities to identify the different challenges associated with key technologies for building new applications for improving quality of lives in smart cities.
Architectural Design Based on the Influence of Indoor and Outdoor Environments
Buildings are responsible for over 40% of the world's energy consumption and one-third of global carbon emissions. Furthermore, energy consumption in buildings is on track to increase around 50% by 2050 due to rapid population growth in urban areas and subsequent demand of resources from emerging countries. Considering that architectural design has an important impact on the energy consumption of buildings, this Special Issue aims to collect cutting-edge research articles on the technologies that address climate-conscious design. This Special Issue features 16 research articles and 1 review article authored by 55 contributors from different countries, including Australia, China, Cyprus, Iraq, Iran, Spain, Turkey, United Arab Emirates, and the United Kingdom. Collectively, these articles cover multiple perspectives, both experimental and theoretical, addressing the problem of designing with climate in mind, while also creating meaningful architecture. Each article offers unique contributions, and collectively they all share a similar objective, i.e., reducing building energy demand and carbon emissions while promoting occupant environmental well-being and eventually providing intangible benefits in the human realm.
Information Technologies and Mathematical Modelling. Queueing Theory and Related Fields
This book constitutes the refereed proceedings of the 23rd International Conference on Information Technologies and Mathematical Modelling. Queueing Theory and Related Fields, ITMM 2024, held in Karshi, Uzbekistan, during October 20-26, 2024. The 26 full papers included in this book were carefully reviewed and selected from 136 submissions. The papers are devoted to new results in queueing theory and its applications, and also related areas of probabilistic analysis. Its target audience includes specialists in probabilistic theory, random processes, and mathematical modeling as well as engineers engaged in logical and technical design and operational management of data processing systems, communication, and computer networks.
The Art of Cartooning Anything
The Art of Cartooning Anything by Himanshu Mire is a dynamic guide that introduces readers to the exciting world of cartooning. Drawing from his unique expertise, Himanshu explores the creative process behind cartoon creation, offering valuable insights for artists at any level. The book covers a wide array of techniques, including 3D animation, 2D illustration, and character development, while also delving into the art of storytelling. Additionally, it provides practical advice on how to turn your passion for cartooning into a profitable career, with proven strategies for earning income. Whether you're a beginner or an experienced artist, this book is packed with inspiration and actionable tips to help you unlock your creative potential and confidently master the art of cartooning.
Visionaries, Rebels and Machines
The electrifying story behind technology's greatest breakthroughs.From the first sparks of electrification to the dawn of artificial intelligence, Visionaries, Rebels and Machines is a rip-roaring adventure through the history of technology.It reveals how curiosity, ingenuity, bold breakthroughs and pure chance have driven progress, leading to the artificial intelligence, automation and cloud computing that's reshaping our world today. It's not just about how we got here, but also where we're heading. Understanding this evolution helps us make informed decisions, seize opportunities and stay ahead in a rapidly shifting landscape.Discover the domino effect of innovation - those unexpected connections and coincidences that have triggered ideas, innovation, experimentation and technological revolution. And, along the way, meet an eccentric cast of fascinating characters that include a video-rental entrepreneur, a bookseller-turned-tech titan, scientists electrifying frogs and a teenage cybercriminal.With wit, insight and a touch of irreverence, industry expert Jamie Dobson tells a gripping tale of risk-takers and revolutionaries, taking you on a whirlwind ride through tech's surprising history that's bigger, bolder and more astonishing than you ever imagined.
Tools and Algorithms for the Construction and Analysis of Systems
The open access book set LNCS 15696, 15697 and 15698 constitutes the proceedings of the 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2025, which was held as part of the International Joint Conferences on Theory and Practice of Software, ETAPS 2025, during May 3-8, 2025, in Hamilton, Canada. The 46 papers presented were carefully reviewed and selected from 148 submissions. The proceedings also include 14 papers from the Software Verification competition which was held as part of TACAS. The papers were organized in topical sections as follows: Part I: Program analysis, ATP and rewriting; model checking; LTL; verification; Part II: SAT and SMT solving; proofs and certificates; synthesis; equivalence checking; games; Part III: Verification; quantum and GPU; 14th Competition on Software Verification, SV-COMP 2025.
Foundations of Software Science and Computation Structures
This open access book constitutes the proceedings of the 28th International Conference on Foundations of Software Science and Computation Structures, FOSSACS 2025, which took place in Hamilton, Canada, during May 2025, held as part of the International Joint Conferences on Theory and Practice of Software, ETAPS 2025. The 19 papers included in these proceedings were carefully reviewed and selected from 58 submissions. They focus on foundational research in software science on theories and methods to support the analysis, integration, synthesis, transformation, and verification of programs and software systems.
Augmented Reality
-Presents various modern and practical applications of augmented reality technology and explores the use of augmented reality in the education sector and its potential to enhance the learning experience.-Discusses the use of digital holographic microscopy for cytopathology, which allows for high-resolution imaging of biological samples and explores the latest advances in single and multiwavelength digital holography and holographic microscopy.-Examines the use of augmented reality in technical and vocational education and training and describes the use of intelligent virtual and augmented reality for managing natural disasters.-Presents the latest advances in spatially faithful 3D telepresence technology and discusses the use of augmented reality in different building information modeling (BIM) workflows.-It explores the use of design thinking for computer-aided co-design in architecture and discusses the potential of augmented reality as an emerging technology for promoting products and services.-This book is for game developers interested in adding AR capabilities to their games and apps. The book assumes beginner-level knowledge of Unity development and C# programming, familiarity with 3D graphics, and experience in using existing AR applications.
Brain-Computer Interface
-It explores the idea that language serves as a model for how the human mind works, and how it can be used to develop brain-computer interfaces (BCIs) that facilitate communication between the brain and external devices.-It provides an overview of methods used to handle artifacts in electroencephalography (EEG) signals, and discusses the use of a fuzzy inference system to identify pain in EEG signals.-It explores the use of unsupervised machine learning algorithms to analyze multivariate real-time series data in BCIs, with the potential to improve the accuracy and efficiency of these systems.-It discusses the potential therapeutic effect of infra-low-frequency neurofeedback training on children and adolescents with attention deficit hyperactivity disorder (ADHD) and provides an overview of research exploring the relationship between entropy and the emotional brain.-This book discusses the use of wavelet features and various machine learning methods to evaluate steady-state visually evoked potentials-based BCIs, with the potential to improve the accuracy and efficiency of these systems.-It explores the use of a brain-computer interface drone, which can be controlled by the user's thoughts and may have potential applications in areas such as search and rescue, surveillance, and agriculture.-This book is an excellent reference for scientists, researchers, neurologists, psychiatrists, and other medical professionals, engineers, technologists and the general public may be interested in learning about the latest research findings, as well as the potential benefits and risks of BCI technology.
Data Mining
-The book covers a wide range of topics related to data mining, including deep learning, decision tree induction, association rule mining, analytical statistics techniques, clustering, and more.-The book provides numerous case studies and examples that illustrate how data mining techniques can be applied in real-world settings, such as in banking, education, software engineering, and weather forecasting.-The book emphasizes the importance of machine learning in data mining and provides a detailed discussion of various machine learning techniques, such as regression and classification.-The book uses Python programming language and MapReduce algorithms to illustrate various data mining techniques, making it accessible to readers with programming experience.
Open Source and Libraries
Open source library software in computer science provides an easier means for programmers to develop dynamic interfaces by storing readily accessible and frequently used routines and resources, such as classes, configuration data, documentation, help data, message templates, pre-written code and subroutines, type specifications, and values.
Building Information Modeling
-Provides a comprehensive overview of the principles and practices of BIM, a digital modeling process used in the Architecture, Engineering, Construction, and Operations (AECO) industry. Begins with an introduction to the concept of BIM and its evolution over the years.-Covers the basics of digital information and its importance in the AECO industry. It also discusses the process of digitization and its role in improving efficiency and accuracy in the industry.-Provides the different types of representation used in the AECO industry, including symbolic and analogue representations. It also covers the specific representation techniques used in BIM.-Focuses on data and information management in BIM and explores the basics of data and information and their importance in decision-making processes.-Covers the various decision-making processes in the AECO industry and the role of information in these processes. It also covers process and information diagrams used in BIM to improve project management.-It is an essential guide for professionals and students in the AECO and it is a valuable resource for anyone looking to improve efficiency and accuracy in their projects
Computational Methods in Wind Engineering
In wind engineering, in parallel to all other engineering disciplines, the impact of computational methods is rapidly increasing. As far as computational aspects are concerned, wind engineering embodies a series of specific challenges, including the availability of suitable validation data, the definition of boundaries and boundary conditions, scale disparities, and fluid-structure interaction. The present Special Issue shows recent advances in the development and application of computational methods in wind engineering.
Ethics of Artificial Intelligence In Education
Introduction to AI in Education: Provide a comprehensive overview of how artificial intelligence (AI) is being integrated into educational settings, including applications such as adaptive learning systems, intelligent tutoring, automated grading, and administrative tools. Discuss the potential benefits and transformative impact of AI on teaching and learning.Ethical Principles and Frameworks: Explore the fundamental ethical principles and frameworks relevant to AI in education, including fairness, transparency, accountability, privacy, and bias. Discuss how these principles apply to the development and deployment of AI technologies in educational contexts.Bias and Equity: Address the challenges of bias and equity in AI systems, including how biases in algorithms and data can impact educational outcomes. Provide insights into strategies for mitigating bias, promoting inclusivity, and ensuring equitable access to AI-powered educational tools and resources.Ethical Governance and Policy Recommendations: Discuss the role of governance and policy in ensuring ethical AI use in education. Explore best practices for developing ethical guidelines, establishing oversight mechanisms, and fostering collaboration among educators, technologists, policymakers, and stakeholders to address ethical concerns and promote responsible AI use.
Digital Accessibility
-This book provides a practical guide to implementing digital accessibility within an enterprise, covering everything from creating a culture of accessibility to hiring staff and developing procurement policies that prioritize accessibility.-Provides a comprehensive overview of digital accessibility, its importance, and its impact on businesses and also focuses on the role of a committee or team responsible for ensuring digital accessibility within an enterprise.-Describes how to create a culture of digital accessibility within an enterprise, including how to raise awareness among employees and foster a commitment to accessibility throughout the organization.-Focuses on how to develop procurement policies that prioritize accessibility when purchasing technology, software, or services. It may also discuss how to create an accessibility policy that outlines an enterprise's commitment to accessibility.
What We Talk About When We Talk About Systems
Against Metaphysical Necessity
One should not commit to metaphysical necessity; semantic modalities are enough. The best approaches to elucidate semantic modalities are versions of linguistic ersatzism and fictionalism, even if only developed in parts. Within these necessary properties and the difference between natural and semantic laws can be accounted for. The proper background theory for this is an updated version of Logical Empiricism. The anti-metaphysical attitude of Logical Empiricism deserves revitalization. The second part of the book illustrates a methodological observation from the first part: elucidating a concept can proceed by computational modelling. As an example, the book concerns modelling belief dynamics in the sense of building a computational model. The purpose is to illustrate some ideas about belief changes in a web of beliefs to explore and deepen one's understanding of belief changes by implementing corresponding algorithms. As a part of the model accepting conditionals and counterfactuals can be understood by versions of Ramsey Tests, i.e. again without modal commitments.
Machine Learning and Data Analytics for Cyber Security
The aim of this reprint is to provide an overview of the current challenges within the cyber security community today, as recognized by our contributors. This reprint provides 16 papers from the Topical Collection on "Machine Learning and Data Analytics for Cyber Security" that cover topics of large language models for cybersecurity claim classification, adversarial machine learning attacks against intrusion detection systems, the detection of PLC process control anomalies, identifying session-replay bots compared to human users, and mitigating against side-channel attacks.
Synergy and Redundancy Measures
The following Special Issue covers advances in both the theoretical formulation and applications of information-theoretic measures of synergy and redundancy. An important aspect of how sources of information are distributed across a set of variables concerns whether different variables provide redundant, unique, or synergistic information when combined with other variables. Intuitively, variables share redundant information if each variable individually carries the same information carried by other variables. Information carried by a certain variable is unique if it is not carried by any other variables or their combination, and a group of variables carries synergistic information if some information arises only when they are combined. Recent advances have contributed to building an information-theoretic framework to determine the distribution and nature of information extractable from multivariate data sets. Measures of redundant, unique, or synergistic information characterize dependencies between the parts of a multivariate system and can help to understand its function and mechanisms. This Special issue provides updates on advances in the formulation and application of decompositions of the information carried by a set of variables about a target of interest. Advances in the theoretical formulation comprise the connection with channel ordering, with information compression, and the characterization of decision regions. Applications extend to, among others, structure learning, characterizing emergence in complex systems, and understanding representations in cognition.
The Apple II Age
An engrossing origin story for the personal computer--showing how the Apple II's software helped a machine transcend from hobbyists' plaything to essential home appliance. Skip the iPhone, the iPod, and the Macintosh. If you want to understand how Apple Inc. became an industry behemoth, look no further than the 1977 Apple II. Designed by the brilliant engineer Steve Wozniak and hustled into the marketplace by his Apple cofounder Steve Jobs, the Apple II became one of the most prominent personal computers of this dawning industry. The Apple II was a versatile piece of hardware, but its most compelling story isn't found in the feat of its engineering, the personalities of Apple's founders, or the way it set the stage for the company's multibillion-dollar future. Instead, historian Laine Nooney shows, what made the Apple II iconic was its software. In software, we discover the material reasons people bought computers. Not to hack, but to play. Not to code, but to calculate. Not to program, but to print. The story of personal computing in the United States is not about the evolution of hackers--it's about the rise of everyday users. Recounting a constellation of software creation stories, Nooney offers a new understanding of how the hobbyists' microcomputers of the 1970s became the personal computer we know today. From iconic software products like VisiCalc and The Print Shop to historic games like Mystery House and Snooper Troops to long-forgotten disk-cracking utilities, The Apple II Age offers an unprecedented look at the people, the industry, and the money that built the microcomputing milieu--and why so much of it converged around the pioneering Apple II.