Digital Culture Shock
How culture shapes the design and use of technology--and how we can resist the one-size-fits-all approach to technology design Robots that encroach on your personal space, baffling emojis, a chatbot that gives you an answer that seems terribly rude--does any of this sound familiar? If so, you may know what it feels like to experience a clash of cultures, or even culture shock, in technology. Culture--shared values, norms, and behaviors--influences both the design of technology and its use. An encounter with new technology can teach us to embrace the unfamiliar, but a mismatch between design and user can create misunderstanding and loss of trust, and can even become a tool of digital imperialism. In Digital Culture Shock, computer scientist Katharina Reinecke travels through countries and cultures around the world to show the many fascinating ways that technology design and use can differ. Reinecke argues that technology is inherently cultural because developers apply their own knowledge and experiences when creating it. And this can make the technology fail in other settings. For example, robotaxis trained on driver behavior on a California highway are paralyzed when confronted with the more complicated traffic flows of Egypt. Western online social networks, designed to convey one's individuality, violate the need to preserve the image of a family in more group-oriented cultures. Likewise, the visual complexity common in many East Asian websites can be overwhelming to North Americans and European users, who tend to prefer simpler designs. Making it clear what's at stake, Reinecke urges us to resist generalizing our own cultural peccadillos in technology design.
Intelligent Systems of Computing and Informatics in Sustainable Urban Development
This book explores intelligent systems in computing and informatics, focusing specifically on their role in advancing Sustainable Development Goal (SDG) No. 11 - Sustainable Cities and Communities.
10th Anniversary of Processes
The aim of this reprint is to show the main lines of research in green environmental processes in recent years. As in previous years, there is a clear trend in current environmental research towards biological processes for the treatment of water, wastewater, waste, and soil; however, pyrolysis and biochar have emerged with force. Several papers highlighting the role of this thermal treatment and the uses of biochar as its main product are included in the review as an emerging line of research that is gaining in importance. Biochar-based processes are gaining popularity in key environmental technologies involving bioremediation, decontamination, and decarbonisation.
Mastering Mobile Network and Related Security
In an era where telecommunication networks form the backbone of our digital society, this book provides a definitive resource for understanding and implementing robust security measures across various generations of telecom infrastructure. From the fundamental security challenges of 1G networks to the complex threat landscape of 5G, this book delivers a thorough examination of vulnerabilities, attack vectors, and defense strategies that every telecom professional must understand.This book systematically covers the entire mobile security spectrum. Drawing on real-world implementations and architectures, this guide bridges the gap between theoretical security concepts and practical deployment. Each chapter combines technical depth with actionable insights, featuring designs that demonstrate how service providers have successfully implemented defense-in-depth approaches across 3G, 4G, IMS, virtualized environments, RAN, transport, multi-access edge computing (MEC) infrastructures, and other telecom components.Whether you are a security specialist seeking telecom-specific expertise, an engineer responsible for secure network design, an executive making strategic security investments or a student preparing for a career in telecommunications, this book provides the knowledge you need to protect critical telecom infrastructure. The included frameworks, checklists, and reference architectures serve as practical tools that can be applied to strengthen your organization's security posture in today's rapidly evolving threat landscape. WHAT YOU WILL LEARN● Understand various telecommunication architectures across all telecom generations.● Identify and mitigate security threats and vulnerabilities across all telecom generations.● Implement defense strategies for critical telecommunications network infrastructure.● Analyze and respond to sophisticated attacks targeting telecommunications assets.● Transform security concepts into solutions using field-tested architectural patterns.WHO THIS BOOK IS FORThis book is intended for security professionals, telecom engineers, executives, and students looking to understand the security landscape of modern telecommunications networks. It is ideal for those interested in converged telecom ecosystems and who have a foundational understanding of telecommunication architecture, telecom nomenclature, general networking principles, and basic cybersecurity concepts.
Operations Research and Enterprise Systems
This book constitutes the refereed proceedings of extended papers of the 13th International Conference on Operations Research and Enterprise Systems, ICORES 2024, held in Rome, Italy, during February 24-26, 2024 The 4 full papers and 4 short papers included in this book were carefully reviewed and selected from 63 submissions. This ICORES 2024 focus to bring together researchers, engineers, faculty, and practitioners interested in both theoretical advances and practical applications of operations research.
Hci for Cybersecurity, Privacy and Trust
This book constitutes the refereed proceedings of the 7th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 27th International Conference, HCI International 2025, in Gothenburg, Sweden, during June 22-27, 2025. Two volumes of the HCII 2025 proceedings are dedicated to this year's edition of the HCI-CPT conference. The first volume focuses on topics related to Human-Centered Cybersecurity and Risk Management, as well as Cybersecurity Awareness, and Training. The second volume focuses on topics related to Privacy, Trust, and Legal Compliance in Digital Systems, as well as Usability, Privacy, and Emerging Threats.
Selected Papers from CEES 2021, the first International Conference on Construction, Energy, Environment and Sustainability (Coimbra, 2021), on the topic of Sustainable Construction Materials and Techn
The construction sector's carbon emissions drive innovation in sustainable materials and systems. As industries modernize, digital transformation becomes essential. This 2022 Special Issue (SI) highlights sustainable technologies, stressing multidisciplinary collaboration to enhance efficiency, meet environmental standards, and support the United Nations sustainable development goals (SDGs) for "peace and prosperity for people and the planet".
The Landauer Principle and Its Implementations in Physics, Chemistry and Biology
The rapid development of computers has stimulated growing interest in the physical foundations of computation. This interest arises from both applicative and fundamental aspects of computation. In the most general terms, computation involves transforming inputs into outputs using a specific set of instructions. The necessary questions include the following: What are the physical limitations of computation? What are the minimal energy costs of computation, and what is the maximal possible velocity of computation? The Landauer principle, addressed in this Special Issue, is one of the limiting physical principles that constrain the behavior of computing systems. The Landauer principle restricts the minimal energy necessary for the erasure of one bit of information. Rolf Landauer adopted the notion that computation is a physical process; thus, it must obey the laws of physics, and first and foremost, the laws of thermodynamics. This thinking led to a new limiting physical principle, establishing minimal energy costs for the erasure of a single memory bit for a system operating at equilibrium temperature T. According to Landauer, this energy is E=kBTln2. This Special Issue discusses the Landauer principle in the context of other physical limiting principles, such as the Mandelstam-Tamm and Margolus-Levitin limiting principles. The Special Issue addresses a diversity of problems related to the meaning and applications of the Landauer principle. It discusses the interrelation between logical and thermodynamic irreversibility and precise links between energy and information.
Chaos Royale
Chaos Royale is a multifaceted non-fiction exploration of a catastrophic system known as FMK-an intricate dystopian framework built on manipulation, control, and violent power dynamics. Blending incisive critique with personal narrative, the book diagnoses systemic societal failures and presents bold solutions through the Truth Snowball Project, the Armistice Agreement, and the BRAVO system (Bold Revamped Architecture to Minimize Volatile Outcomes)-a next-generation human capital strategy aimed at disrupting and dismantling this legacy.As a bonus compendium, Chaos Royale introduces CUBE, a modernized object-oriented classification and security clearance system vital for navigating and winning modern informatics wars.
Integer Programming and Combinatorial Optimization
This book constitutes the refereed proceedings of the 26th International Conference on Integer Programming and Combinatorial Optimization, IPCO 2025, held in Baltimore, MD, USA, during June 11-13, 2025. The 33 papers presented here were carefully reviewed and selected from 109 submissions. These papers focus on the recent developments in theory, computation, and applications of integer programming and combinatorial optimization.
Blockchain Tales
Unlock imagination while learning how the digital world works!Blockchain Tales brings blockchain concepts to life through four imaginative and engaging stories written just for kids. This storybook collection pairs perfectly with the Blockchain Basics Curriculum, but can also be enjoyed as a standalone read-aloud or independent reading experience.Each tale introduces a foundational Web3 topic in a way that's fun, relatable, and easy to understand.Includes 4 stories: The Blockchain Odyssey - What is blockchain?Welcome to Nodesville - All about nodes and their rolesCryptonia Chronicles - A fun look at cryptocurrency in a digital worldPixel Perfect Pets - Exploring smart contracts through virtual pet adoptionPerfect for classrooms, homeschool, or bedtime reading, Blockchain Tales helps kids build 21st-century literacy through the power of story.Pair with the Blockchain Basics Curriculum for a complete educational experience!
Software Architecture with Spring
Master strategies for crafting high-performance Java systems with Spring 6.0 and making the right architectural decisions to ensure scalability and robustnessKey Features: - Confidently make strategic architectural choices that align business needs with technical excellence- Design and evolve a real-world system using the right architectural patterns- Explore essential architectural styles and tackle challenges like scalability, security, and maintainability with ease- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Keep up with the fast-paced tech landscape with Software Architecture with Spring, your practical guide to making strategic architectural decisions that align seamlessly with your business objectives.Drawing from Wanderson's decades of experience, you'll journey through the complete software development lifecycle-from initial requirements gathering, through development and testing, to production deployment. You'll get hands-on with the evolution of an auction system, exploring its transformation through multiple architectural styles. You'll discover how you can effectively transform a monolithic system into microservices using proven patterns and practices.As you progress, you'll master advanced architectural paradigms such as Event-Driven Architecture, Filter-and-Pipeline Architecture, and Serverless Architecture.What You Will Learn: - Translate complex business needs into clear and implementable design- Design resilient systems with common architectural styles- Transform monolithic applications into microservices following best practices- Implement event-driven architecture with Kafka- Monitor, trace, and ensure robust testing, security, and performance- Identify bottlenecks and optimize performance using patterns, caching, and database strategies- Automate development workflows with CI/CD pipelines, using Jenkins to deploy the application to KubernetesWho this book is for: This book is for Java engineers transitioning to software architecture roles and architects seeking deeper insight into Spring-based architectural styles. Mid-level Spring Boot developers will be able to master architecture principles to build scalable, maintainable applications with the help of practical guidance on using modern architectural patterns.To get the most out of this book, being proficient in Java with an object-oriented programming background, and having a solid understanding of the Spring Framework is essential. It would help to have a basic knowledge of Git and Maven, as well as databases, Docker, and Docker Compose.Table of Contents- Diving into Software Architecture- Decision-Making Processes in Software Architecture- Understanding the System Context- Monolithic Architecture - Client Server Architecture- Microservices Architecture- Microservices Patterns with Spring Cloud- Event-Driven Architecture- Serverless and Pipe-and-Filter Architecture- Security- Observability- Testing- Performance and Optimizations- Orchestration with Kubernetes- Continuous Integration and Continuous Deployment
Computational Complexity and Local Algorithms
This volume contains a collection of studies in the areas of complexity theory and Local Algorithms.
Discrete Mathematics
Discrete Mathematics presents the material in an easily accessible manner. Beside the usual content (expanded a little bit), a special writing style is used. We start with the natural numbers, function and relations, as well as the powerset lattice. The second chapter illustrates set theory with its laws and the Generalized Continuum Hypothesis. Chapter 3 delivers Boolean Algebra, with the double exponential formula for the # different boolean functions. The next chapter covers the induction, direct, and indirect proof. Chapter 5 presents combinatorics: Rules of sum, product, quotient, the pigeonhole principle, in/exclusion, permutation and binomial coefficient, plus Stirling numbers of 1st and 2nd kind as well as the Bell number; additionally, the recurrence relation with back- and forward reasoning is offered. We conclude with general and conditional probability, incl. the Monty Hall problem. Discrete Mathematics presents the material in a lively fashion, including topics which are usually not presented. Providing an annex with questions and solutions it offers the chance to the readers worldwide to grasp the subject in this handy and clearly arranged treatise.
Blockchain Basics Curriculum
Empower the next generation with the knowledge of tomorrow.Blockchain Basics Curriculum is a comprehensive, easy-to-teach educational program designed for students in grades 5, and adaptable for 4th-6th grade learners. This 4-unit guide makes it simple for any educator-no prior tech experience needed-to introduce foundational blockchain concepts through engaging stories, activities, and age-appropriate discussion.With a focus on reading, writing, vocabulary, creative thinking, and STEM integration, this program makes cutting-edge technology accessible, creative, and fun.What's Inside: 4 Complete Units: What is Blockchain?All About NodesCryptocurrencySmart Contracts Spelling, vocabulary, reading comprehension, writing prompts Worksheets, activities, matching games, quizzes, and answer keys Discussion guides and teacher-friendly lesson plans Designed to accompany the Blockchain Tales storybook collectionWhether you're teaching in a classroom, leading a homeschool group, or supplementing STEM learning, this curriculum invites both educators and students to explore the world of blockchain through hands-on, story-led learning.Created by Elizabeth Sullivan, author of over 20 children's books on blockchain and a passionate advocate for accessible tech education.
Practical Serverless and Microservices with C#
Take a realistic look at microservices and distributed systems with the .NET stack to understand the limitations of microservices development through a practical lensFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key Features: - Work through common scenarios encountered when developing distributed microservices applications- Understand cost considerations, traffic limits, and time limits surrounding serverless environments- Take full advantage of the synergy between Azure services (Container Apps, Functions, and Aspire) and .NET code- Purchase of the print or Kindle book includes a free eBook in PDF formatBook Description: From the authors of the Software Architecture with C# and .NET series comes this practical and grounded showcase of microservices using the .NET stack.Written for .NET developers entering the world of modern cloud and distributed applications, it shows you when microservices and serverless architectures are the right choice for building scalable enterprise solutions and when they're not. You'll gain a realistic understanding of their use cases and limitations. Rather than promoting microservices as a one-size-fits-all solution, it encourages thoughtful adoption based on real-world needs.Following a brief introduction and important setup, the book helps you prepare for practical application through examples such as a ride-sharing website. You'll work with Docker, Kubernetes, Azure Container Apps, and the new .NET Aspire with considerations for security, observability, and cost management. The book culminates in a complete event-driven application that brings together everything you've covered.By the end of this microservices book, you'll have a well-rounded understanding of cloud and distributed .NET-through the lens of two industry veterans.What You Will Learn: - Set up serverless environments in Azure for developing and debugging- Design reliable communication and computation across microservices- Explore Azure Functions in depth and use triggers for IoT and background tasks- Use Azure Container Apps to simplify the creation and management of containers- Apply best practices to secure a microservices application- Accurately assess and calculate costs and usage limits in serverless solutionsWho this book is for: This book is for engineers and senior software developers looking to advance into modern cloud and distributed applications. It helps professionals evolve their knowledge of microservices and serverless architecture to get the best of both architectural models. Prior experience with C#/.NET and the Microsoft Stack (Entity Framework and ASP.NET Core) is required to get the most out of this book.If you've enjoyed the authors' previous Software Architecture with C# and .NET series, this new book offers an in-depth exploration of select topics in those earlier works.Table of Contents- Demystifying Serverless Applications- Demystifying Microservices Applications- Setup and Theory: Docker and Onion Architecture- Azure Functions and Triggers Available- Background Functions in Practice- IoT Functions in Practice- Microservices in Practice- Practical Microservices Organization with Kubernetes- Simplifying Containers and Kubernetes: Azure Container Apps and Other Tools- Security and Observability for Serverless and Microservices Applications- The Car Sharing App- Simplifying Microservices with .NET Aspire
How to write effective prompts for ChatGPT
This comprehensive guide will explore how you can write effective prompts for ChatGPT to maximize results and minimize frustration. Designing good prompts is both an art and a science that combines clarity, precision, and creativity with a deep understanding of how AI systems work.
Application and Theory of Petri Nets and Concurrency
This book constitutes the proceedings of the 46th International Conference on Application and Theory of Petri Nets and Concurrency, PETRI NETS 2025, held in Paris, France, during June 22-27, 2025. The 21 full papers and 1 short paper included in this book were carefully reviewed and selected from 48 submissions. They deal with topics such as composition and synthesis; workflow nets; process mining; model checking; communication & concurrency; timed and stochastic Petri nets; etc. The proceedings also include one invited talk in full paper length.
Smart Cities at Play
This book explores how smart cities enable new and playful ways for citizens to experience, inhabit and socialise within urban environments. It will be a resource for scholars and researchers of information technology.
Statistical Modeling and Robust Inference for One-Shot Devices
The study of one-shot devices such as automobile airbags, fire extinguishers, or antigen tests, is rapidly becoming an important problem in the area of reliability engineering. These devices, which are destroyed or must be rebuilt after use, are a particular case of extreme censoring, which makes the problem of estimating their reliability and lifetime challenging. However, classical statistical and inferential methods do not consider the issue of robustness. Statistical Modeling and Robust Interference for One-shot Devices offers a comprehensive investigation of robust techniques of one-shot devices under accelerated-life tests. With numerous examples and case studies in which the proposed methods are applied, this book includes detailed R codes in selected chapters to help readers implement their own codes and use them in the proposed examples and in their own research on one-shot devicetesting data. Researchers, mathematicians, engineers, and students working on acceleratedlife testing data analysis and robust methodologies will find this to be a welcome resource.
General Topology and Analysis
General Topology and Analysis provide a theoretical foundation that supports research in various practical applications. However, students often consider these subjects challenging. In response, the book provides a straightforward and comprehensive presentation of the material. This book covers all the essential topological structures in an abstract manner to understand concepts such as continuity, homeomorphism, and limits. It also delves into metric spaces and complete spaces, which are crucial special cases of topological spaces. Additionally, it explores the fixed-point theorem and its applications and fundamental theorems. It also includes compact topological spaces and connected topological spaces, and it addresses normed vector spaces and continuous linear (or multilinear) applications, which are fundamental tools in functional analysis. Also, the book contains examples that could be useful for students interested in electrical engineering. Moreover, diagrams in the book are designed not only to clarify the specific topic but also to connect that topic with other branches of topology and geometry. The counter-examples, problems, and exercises are well chosen in order of difficulty. This book serves as a textbook for graduate and advanced students interested in math applications to functional analysis, differential equations, computer science, control theory, and optimization.
Exploring Digitally-Mediated Communication with Corpora
Specialized corpora of the language of Computer-mediated Communication and Social Media are increasingly vital for the analysis of the "unparalleled and rapidly evolving diversity in terms of speakers and settings" in digital contexts, as well as of "language evolution seen through the lens of user-generated content, which gives access to a number of variants, socio- and idiolects" (Barbaresi 2019: 29-30). This volume brings together corpus-based, language-centered research on CMC and social media in linguistics, philologies, communication sciences, media, and social sciences with research questions from the fields of corpus and computational linguistics, language technology, text technology, and machine learning. It features research in which computational methods and tools are used for language-centered empirical analysis of CMC and social media phenomena as well as research on building, processing, annotating, representing, and exploiting CMC and social media corpora, including their integration in digital research infrastructures.
The Mathematical Theory of Semantic Communication
This Open Access Book explores how classical information theory's focus on syntactic information has limited the further development of communication science. Recently, communication technologies that handle and transmit semantic information have gained widespread attention in academia. Semantic communication has paved new directions for the future of communication technology development, yet it lacks a general mathematical guiding theory. To address this challenge, this open access book constructs a theoretical framework for semantic information theory and provides a systematic exposition of the measurement system for semantic information and the theoretical limits of semantic communication. It serves as a professional reference for researchers in information and communication. The book begins by deeply analyzing the data characteristics of various information sources and the needs of downstream tasks to summarize and generalize the universal attribute of semantic information--synonymity and to define the synonymous mapping between semantic information and syntactic information. Stemming from this core concept, synonymous mapping, this book introduces the measures of semantic information. It then introduces a new mathematical tool, Synonymous Asymptotic Equipartition (AEP), to explore the mathematical properties of synonymous typical sequences and applies random coding and synonymous typical sequence decoding/encoding to prove the semantic lossless source coding theorem, semantic channel coding theorem, and semantic limited distortion source coding theorem. In addition, the semantic information measures in the continuous case are discussed and a new channel capacity formula of the band-limited Gaussian channel is obtained, which is an important extension of the classical channel capacity. The book is a valuable resource for researchers, academics, and professionals in the field of information and communication, particularly those interested in advancing the frontiers of semantic communication technology.
Advances in Image Processing, Artificial Intelligence and Intelligent Robotics
The aim of this reprint is to give researchers the opportunity to present new tendencies, the latest achievements and research directions, and their current work on important issues in image processing, deep learning, soft computing, sensor fusion, robotic vision, and applied industrial solutions in robotics.
Data Analysis and Visualization with Microsoft Excel
""Data Analysis and Visualization with Microsoft Excel: A Practical Guide"" Unlock the full potential of Microsoft Excel as a powerful tool for data analysis and visualization. Data Analysis and Visualization with Microsoft Excel: A Practical Guide takes you on a journey from basic to advanced Excel techniques, empowering you to analyze, interpret, and visualize data with confidence. Designed for both beginners and experienced users, this book covers everything you need to know to transform raw data into meaningful insights. Learn how to efficiently organize and clean your data, perform statistical analyses, and create dynamic charts and graphs that clearly communicate your findings. With step-by-step tutorials, practical tips, and real-world examples, you'll discover how to leverage Excel's robust features to solve complex data problems and make informed decisions. Whether you're a business professional, student, or researcher, this guide will help you harness the power of Excel to analyze data and present it in ways that are both insightful and visually compelling.
Trajectory Analysis, Positioning and Control of Mobile Robots
The aim of this reprint is to explore and highlight the recent advancements and interdisciplinary approaches in the field of mobile robotics, focusing on trajectory analysis, positioning, and control. This Special Issue features a curated selection of cutting-edge studies, ranging from the development of novel odometry systems for challenging environments to the integration of augmented and virtual reality technologies for enhanced robot teleoperation and human-robot collaboration. The research presented includes breakthroughs in autonomous navigation, such as innovative SLAM techniques for dynamic and GPS-denied environments, deep reinforcement learning approaches for exploration, and advanced control strategies for trajectory optimization in complex scenarios. Additionally, contributions delve into the implementation of mobile robots in real-world applications, including smart manufacturing, disaster response, and healthcare, emphasizing their adaptability and efficiency. By bridging diverse disciplines like artificial intelligence, control theory, and human-computer interaction, this reprint not only showcases the latest technological progress but also sets the stage for future innovations. Each study provides valuable insights into refining mobile robotic systems to seamlessly integrate into human environments, enhancing safety, usability, and performance. This collection is a testament to the transformative potential of mobile robotics to address contemporary challenges and create a more intelligent, connected, and efficient world.
We Have Never Been Human
We Have Never Been Human boldly reimagines what it means to be human, challenging the traditional notions that bind our identity to biology and culture. From ancient mythologies to modern technologies, this book reveals a dynamic, ever-evolving human identity shaped by external forces and technological advancements.
Fuzzy Logic Applications in Traffic and Transportation Engineering
Traffic and transportation engineering involves the application of scientific principles to the planning, design, and operation of facilities for any mode of transportation and to human resource management in industry, which are required to enable the safe, efficient, economical, and environmentally compatible movement of people and goods. Given the complexity of transportation engineering processes, fuzzy logic is a convenient tool for modeling these processes. Fuzzy logic, based on approximate human-like reasoning, offers diverse applications in transportation, a field marked by constant changes, uncertainty, and imprecision. A particular advantage of fuzzy systems is the ability to include multiple goals in calculations and, using adequate optimization algorithms, to achieve high similarity to real-world phenomena. This Special Issue of Mathematics, titled "Fuzzy Logic Applications in Traffic and Transportation Engineering", is devoted to examples of implementing fuzzy logic to solve various traffic and transportation engineering problems for all modes, including road, rail, air, waterborne transport, postal, and logistics industries, as well as telecommunications. The Guest Editors were inspired by the current gap in the literature regarding this topic and the significant potential of fuzzy logic for applications within the field of transportation. Their previous research involved modeling driver behavior using fuzzy inference systems, optimizing them with metaheuristic algorithms, and incorporating fuzzy sets into decision-making theory.
We Have Never Been Human
We Have Never Been Human boldly reimagines what it means to be human, challenging the traditional notions that bind our identity to biology and culture. From ancient mythologies to modern technologies, this book reveals a dynamic, ever-evolving human identity shaped by external forces and technological advancements.
Advances in Mathematical, Numerical and Artificial Intelligence Methods in Rock Engineering Applications
The present reprint contains a total of 13 articles published in the Special Issue "Advances in Mathematical, Numerical and Artificial Intelligence Methods in Rock Engineering Applications" of the MDPI journal Mathematics, covering a wide range of topics connected to the latest applications of mathematical, numerical, and artificial intelligence methods in rock engineering, aiming to contribute to addressing rock-related issues. These topics cover the constitutive modeling and failure criteria of rock materials; theoretical and analytical approaches for deformation, fracture, and failure in rocks; numerical simulation of stress-physical-chemical coupling processes in rocks; theoretical, analytical, and numerical approaches for understanding time- or size-dependent rock failure; characterization of multi-scale rock damage and fracturing; and mathematical methods revealing the mechanisms behind rock disasters that are useful in establishing the associated criteria. The reprint is intended to provide interesting and useful insights for those working in the fields of rock mechanics and rock engineering.
EEG Signal Processing Techniques and Applications
Electroencephalography (EEG) is a well-established non-invasive tool used to record brain electrophysiological activity. It is economical, portable, easy to administer, and widely available in most hospitals. Compared with other neuroimaging techniques that provide information about the anatomical structure (e.g., MRI, CT, and fMRI), EEG offers ultra-high time resolution, which is critical in understanding brain function. Empirical interpretation of EEG is largely based on recognizing abnormal frequencies in specific biological states, the spatial-temporal and morphological characteristics of paroxysmal or persistent discharges, reactivity to external stimuli and activation procedures, or intermittent photic stimulation. Despite being useful in many instances, these practical approaches to interpreting EEGs can leave important dynamic and nonlinear interactions between various brain network anatomical constituents undetected within the recordings, as such interactions are far beyond the observational capabilities of any specially trained physician in this field. This reprint provides a collection of original high-quality research in EEG signal pre-processing, modelling, analysis, and applications in the time, space, frequency, or time-frequency domains, particularly in applications of artificial intelligence and machine learning approaches.
P2P Energy Market
In ""P2P Energy Market: System Architecture"", authors Purav Desai, Sanket Chaudhari, Rahul Adhao, and Jay Lohokare present a groundbreaking exploration of the future of energy distribution. As the world moves towards sustainable solutions, peer-to-peer (P2P) energy markets emerge as a revolutionary alternative to traditional centralized systems. This book delves into the complex architecture required to manage the vast amounts of data generated by smart meters and IoT devices, ensuring efficient and secure energy trading. The authors provide an in-depth analysis of a P2P energy market platform designed to address these challenges. They detail the implementation of a sophisticated rule engine that triggers events based on real-time data, along with robust security mechanisms to protect against False Data Injection Attacks (FDIA). Through the integration of cutting-edge technologies like InfluxDB, Apache Spark, Apache Zeppelin, and Apache Cassandra, this platform offers scalable, efficient, and fault-tolerant solutions for modern energy markets. ""P2P Energy Market: System Architecture"" not only highlights the technical aspects of building such a platform but also emphasizes the socio-economic benefits of decentralized energy systems. By enabling individuals and communities to generate and trade their own renewable energy, P2P markets foster innovation, self-sufficiency, and a greener future. This book is an essential read for researchers, practitioners, and anyone interested in the transformative potential of P2P energy markets.
Crafting Code Canvas
The Internet and Web Programming book helps you to understand concepts of Internet, World-Wide-Web and Programming Fundamentals to create websites by using HTML, DHTML, CSS, JavaScript and AngularJS. An essential feature of the digital age is internet programming, which makes it possible to create interactive websites and applications that consumers worldwide can access. Utilizing programming languages like HTML, CSS, JavaScript, and AngularJS professionals are capable of creating user-friendly and aesthetically pleasing websites. Furthermore, databases and server-side scripting languages like PHP and Python can be integrated with internet programming to allow websites to store and retrieve data dynamically for a more customized user experience. All things considered, internet programming is a major force behind innovation in the digital space.
Urban Underground Space Design
As urban landscapes become increasingly congested, the exploration and utilization of underground spaces offer transformative solutions for sustainable development. This comprehensive volume delves into the structural stability and mechanical analysis of subterranean constructions, presenting cutting-edge research and practical case studies. Key topics include advanced monitoring techniques, embankment stability over soft soils, multi-support excavation methods, and the 3D visualization of seismic data. Authored by leading experts in the field, this book serves as an essential resource for engineers, architects, and urban planners aiming to innovate beneath the surface.
Engineering Psychology and Cognitive Ergonomics
This two-volume set constitutes the thoroughly refereed proceedings of the 22nd International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2025, held as part of HCI International 2025, held in Gothenburg, Sweden, during June 22-27, 2025. Two volumes of the HCII 2025 proceedings are dedicated to this year's edition of the EPCE conference. The first volume centers around a diverse array of interconnected themes related to human performance, workload and situational awareness in the use of complex interactive applications and environments, as well as the role of cognitive psychology on designing and evaluating interactive systems and investigating computer-supported as in collaboration and teaming. The second volume focuses on issues related to Cognitive Psychology in the demanding contexts of aviation and space.
Engineering Psychology and Cognitive Ergonomics
This two-volume set constitutes the thoroughly refereed proceedings of the 22nd International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2025, held as part of HCI International 2025, held in Gothenburg, Sweden, during June 22-27, 2025. Two volumes of the HCII 2025 proceedings are dedicated to this year's edition of the EPCE conference. The first volume centers around a diverse array of interconnected themes related to human performance, workload and situational awareness in the use of complex interactive applications and environments, as well as the role of cognitive psychology on designing and evaluating interactive systems and investigating computer-supported as in collaboration and teaming. The second volume focuses on issues related to Cognitive Psychology in the demanding contexts of aviation and space.
Fundamentals of Software Architecture
DESCRIPTION With the rising complexity of modern software systems, strong, scalable software architecture has become the backbone of any successful application. This book gives you the essential knowledge to grasp the core ideas and methods of effective software design, helping you build strong, flexible systems right from the start.The book systematically navigates the critical aspects of software architecture, commencing with a clear definition of its significance and the pivotal role of the software architect. It delves into fundamental architectural properties like performance, security, and maintainability, underscoring the importance of modularity in crafting well-structured systems. You will explore various established architectural styles, including microservices and layered architecture, alongside key design patterns such as MVC and repository, gaining insights into their practical application. The book further elucidates the function of software components, the art of architecting for optimal performance and security, and essential design principles for building robust solutions. Finally, it examines the impact of modern development practices (Agile, DevOps), positions architecture within the broader engineering context, emphasizes the importance of testing at the architectural level, and offers a glimpse into current and future trends shaping the field.By the end of this book, you will have a solid understanding of the core concepts, helping you to contribute effectively to software design discussions, make informed architectural decisions, and build a strong foundation for creating high-quality, future-proof software systems.WHAT YOU WILL LEARN● Define core architecture, architect roles, and fundamental design attributes.● Apply modularity principles for resilient and adaptable software design.● Design cohesive components, manage coupling, and optimize system decomposition.● Cultivate essential soft skills for effective leadership and stakeholder management.● Define technical requirements and understand modern development practices.WHO THIS BOOK IS FORThis book is for software developers, technical leads, and anyone involved in software creation, seeking a foundational understanding of software architecture principles and practices to enhance their design skills and project outcomes.
Fusion Strategies for Multimodal Biometrics Authentication
The biometric security system identifies the identity of the user and determines whether the user's identity is consistent with what is declared in the system. The identification system identifies the unique identifier that best suits the user's characteristics, while the authentication system determines whether the user is the real user or the system's attacker. The rise of the network interface and the development of new software applications present a high risk of security breaches through multiple means of fraudulent or counterfeit data. Existing biometric security systems require the integration of multiple biometric means. Multimodal biometrics fusion using pretrained Deep learning model will improve the authentication score of the system.
Predicting Municipal Solid Waste Generation Using Machine Learning
Municipal Solid Waste generation is a byproduct of daily human activities, originating from households, offices, commercial enterprises, and other establishments, with the rise in global population, coupled with economic development. The proportion of waste being generated has risen over the years, presenting notable challenges to waste management systems worldwide. Accurate prediction of Municipal Solid waste is important for waste management organizations to plan and make efficient waste management strategies. This thesis explores the utilization of machine learning approaches in predicting municipal solid waste generation accurately for a specific geographic region, concentrating on the city of Boralesgamuwa's in the Colombo District of Sri Lanka based on historical waste generation patterns. Additionally, the research incorporates feature engineering to enrich the dataset by adding relevant features to it using the pandas datetime library. This research is based on two distinct prediction methods, a single-model approach and a multimodel ensemble approach, while incorporating feature engineering. The dataset used in this investigation has historical municipal solid waste.
Logic and Its Applications
This book constitutes the refereed proceedings of the 11th Indian Conference on Logic and Its Applications, ICLA 2025, held in Kolkata, India, during February 3-5, 2025. Four out the five invited talks are included in this book. Out of the 26 submissions, the program committee carefully selected 14 papers to be included in the proceedings. The topics included are Mathematics, Computer Science, Philosophy, Linguistics and Cognitive Science. A special feature of ICLA is the inclusion of studies in systems of logic in the Indian tradition, as well as historical research on logic.
Introduction to Natural Language Processing
This is a comprehensive natural language processing (NLP) guide, covering key techniques like sentiment analysis, machine translation, and named entity recognition. It explores deep learning models, and practical applications in multiple sectors, and is perfect for students and professionals looking to master NLP's transformative power.
Present and Future of E-Learning Technologies
This reprint, Present and Future of E-Learning Technologies, explores the evolving landscape of digital education, focusing on the integration of cutting-edge technologies into learning environments. As e-learning becomes increasingly embedded in both formal and informal educational contexts, this volume examines how innovations such as artificial intelligence, big data, cloud computing, and the Internet of Things are reshaping instructional design and learner engagement. The reprint highlights key emerging trends, including learning analytics, gamification, intelligent tutoring systems, and sensor-based assessment, offering a multidisciplinary perspective that bridges educational theory, software development, and data-driven personalization. With contributions from leading researchers and practitioners, the volume presents critical reflections and case studies on how technology can enhance the effectiveness, inclusivity, and adaptability of digital learning systems. Ideal for educators, instructional designers, researchers, and policymakers, this collection serves as a valuable reference for understanding the current state and future directions of e-learning technologies.
Machine Learning and Soft Computing
This two part-volume CCIS constitutes the refereed proceedings of 9th International Conference, ICMLSC 2025, in Tokyo, Japan in January 24-26, 2025. The 39 full papers and 13 short papers included in this book were carefully reviewed and selected from 121 submissions. They follow the topical sections as below: Part I: Multimodal Data Analysis and Model Optimization; Basic Theories of Machine Learning and Emerging Application Technologies; and Intelligent Recommendation System Design and Privacy Security. Part II: Deep Learning Models and High-performance Computing; Data-driven Complex System Modeling and Intelligent Optimization Algorithms; and Image Analysis and Processing Methods based on AI.
Geometry and Topology with Applications
This reprint is a Special Issue of MDPI's Mathematics, titled "Geometry and Topology with Applications", and it collects several papers that are in some way related to the general research field of geometry. More specifically, among the 13 papers composing the reprint, there are several specific topics, ranging from low-dimensional topology to geometric group theory, differential geometry to algebraic topology, and group theory to graph theory. The aim of this Special Issue was indeed to present new research concerning geometry and topology, broadly speaking, with applications. Some of the authors of these papers are scientists working in well-known research centers in France, Italy, Lithuania, Croatia, Korea, South Africa, China, etc.We hope that the published works will have a positive impact, inspiring other researchers to further develop some of the topics covered in this reprint.
Prompt Magic
Want to unlock the power of AI without losing your creativity?Step inside the Academy of ChatGPT, where prompts are spells, ideas sparkle, and learning feels like magic.Prompt Magic: Learn ChatGPT with Spells, Prompts, and Fun Recipes for Magical Thinking is your practical, playful guide to mastering the art of talking to ChatGPT.This isn't a book about dark arts or mysterious rituals. It's about learning to speak to one of the most powerful tools of our time, AI language models like ChatGPT, in a way that's clear, effective, and joyfully human.Whether you're writing a novel, launching a business, brainstorming marketing ideas, or just exploring what's possible, this book gives you the structure, the spells, and the confidence to create like never before.✦ What You'll Learn Inside This Spellbook: The APE Method (Ask, Persona, Example) for building smarter promptsHow to polish your writing, generate ideas, and brainstorm without burnoutWays to "bend time" with perspective-shifting promptsTools to reframe problems and organize thoughts (aka "building buckets")A complete Grimoire section where you'll create your own custom prompt spellsPlus, a Certificate of Completion from the Academy of ChatGPT itselfThis is not a dry textbook. It's a hands-on, magical workbook with charm, color, and laughter woven into every chapter. You'll find space to write, places to dream, and dozens of ready-to-use "prompt spells" to apply today.✦ Sample Spell: "The Potion of Perfect Ideas"Ingredients: One nagging question, a pinch of humor, and a target audience. Prompt: "You are a creative consultant. Give me 5 outrageous but clever ways to promote a small-town bakery using nothing but flour, window paint, and word of mouth." Effect: Brainstorming, idea liberation, and giggle-induced breakthroughs✦ Why You Need This Book Now: In a world moving faster than ever, knowing how to use AI isn't optional; it's essential.But here's the thing: You don't have to become a coder or tech wizard. You just need to learn the language. This book teaches it in a natural, fun, and somewhat magical way.You'll walk away with skills and a sense of wonder. Because ChatGPT isn't just a tool, it's a creative partner. With the right words, it can help you write smarter, build faster, and think more clearly. Prompt Magic shows you how.✦ Early Reviews ★ ★ ★ ★ ★ "This made me fall in love with ChatGPT-and I was skeptical. Sugar has a way of explaining tech that feels like sitting with a wise friend over coffee." - Lisa M., tech-shy educator★ ★ ★ ★ ★ "My marketing team now keeps this book on the table. It makes creative thinking easier and honestly, more fun." - Jordan T., startup founderOther books: The Prompt Whisperer, Rich Bot Poor Bot
Programming Neural Networks with Python
Neural networks are at the heart of AI--so ensure you're on the cutting edge with this guide! For true beginners, get a crash course in Python and the mathematical concepts you'll need to understand and create neural networks. Or jump right into programming your first neural network, from implementing the scikit-learn library to using the perceptron learning algorithm. Learn how to train your neural network, measure errors, make use of transfer learning, implementing the CRISP-DM model, and more. Whether you're interested in machine learning, gen AI, LLMs, deep learning, or all of the above, this is the AI book you need!Highlights include: 1) Network creation2) Network training3) Supervised and unsupervised learning4) Reinforcement learning5) Algorithms6) Multi-layer networks7) Deep neural networks 8) Back propagation9) Transformers10) Python11) Mathematical concepts12) TensorFlow