Human-Centered Design for Health Care Safety describes a conceptual framework (SEIPS or Systems Engineering Initiative for Patient Safety) based on the Human Factors and Ergonomics (HFE) discipline and associated human-centered design (HCD) approaches and methods that can help to create innovative solutions for enhancing health care safety.
This book covers the security challenges of software-defined networks and proposes innovative solutions, such as the decentralization of security services and integration with blockchain technology, to enhance software-defined network security.
This book discusses the application of digital twin (DT) in condition monitoring of offshore and onshore wind turbines, including a pertinent framework to explain critical component Condition Monitoring and Fault Diagnosis.
This book provides a multi-disciplinary understanding of pathways into and out of youth cybercrime, and evidence-led ways to tackle the cybercrime epidemic, drawing on theoretical perspectives and insights from the largest European H2020 study of youth cybercrime undertaken to date.
This book provides a multi-disciplinary understanding of pathways into and out of youth cybercrime, and evidence-led ways to tackle the cybercrime epidemic, drawing on theoretical perspectives and insights from the largest European H2020 study of youth cybercrime undertaken to date.
This book discusses the application of digital twin (DT) in condition monitoring of offshore and onshore wind turbines, including a pertinent framework to explain critical component Condition Monitoring and Fault Diagnosis.
Human-Centered Design for Health Care Safety describes a conceptual framework (SEIPS or Systems Engineering Initiative for Patient Safety) based on the Human Factors and Ergonomics (HFE) discipline and associated human-centered design (HCD) approaches and methods that can help to create innovative solutions for enhancing health care safety.
This book covers the security challenges of software-defined networks and proposes innovative solutions, such as the decentralization of security services and integration with blockchain technology, to enhance software-defined network security.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Global Security, Safety, and Sustainability (ICDS3), and of the 4th e-Democracy Joint Conferences (e-Democracy 2011) which were held in Thessaloniki in August 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Personal Satellite Services, PSATS 2010, held in Rome, Italy, Februray 2010.
The emergence of quantum computing introduces a significant shift in the digital and security landscape-prompting organizations to reassess the foundations of how we protect information.
The Routledge Handbook of Ethics in Forensic Linguistics is the first comprehensive reference work to explore the ethical dimensions of forensic language analysis across a range of applied and academic contexts.
As digital ecosystems advance toward pervasive connectivity, smart devices have become embedded in the operational, social, and economic fabric of modern life.
As digital ecosystems advance toward pervasive connectivity, smart devices have become embedded in the operational, social, and economic fabric of modern life.
The emergence of quantum computing introduces a significant shift in the digital and security landscape-prompting organizations to reassess the foundations of how we protect information.
Tiny Machine Learning Techniques for Constrained Devices explores the cutting-edge field of Tiny Machine Learning (TinyML), enabling intelligent machine learning on highly resource-limited devices such as microcontrollers and edge Internet of Things (IoT) nodes.
This book provides a comprehensive discussion of deep learning (DL) in medical and healthcare applications, including the fundamentals and current advances in medical image analysis, DL methods for medical image analysis, and DL-based clinical computer-aided diagnosis systems.
Tiny Machine Learning Techniques for Constrained Devices explores the cutting-edge field of Tiny Machine Learning (TinyML), enabling intelligent machine learning on highly resource-limited devices such as microcontrollers and edge Internet of Things (IoT) nodes.
This book introduces a comprehensive model for evaluating the effects of artificial intelligence (AI) on human rights, democracy, and the rule of law and an innovative framework that merges Human Rights Impact Assessments (HRIAs) practices with AI-focused algorithmic impact assessment approaches.
This book provides a comprehensive discussion of deep learning (DL) in medical and healthcare applications, including the fundamentals and current advances in medical image analysis, DL methods for medical image analysis, and DL-based clinical computer-aided diagnosis systems.
This book introduces a comprehensive model for evaluating the effects of artificial intelligence (AI) on human rights, democracy, and the rule of law and an innovative framework that merges Human Rights Impact Assessments (HRIAs) practices with AI-focused algorithmic impact assessment approaches.
Collaborative Networks for a Sustainable World Aiming to reach a sustainable world calls for a wider collaboration among multiple stakeholders from different origins, as the changes needed for sustainability exceed the capacity and capability of any individual actor.
This book constitutes the joint thoroughly refereed post-proceedings of the Second International Workshop on Modeling Social Media, MSM 2011, held in Boston, MA, USA, in October 2011, and the Second International Workshop on Mining Ubiquitous and Social Environments, MUSE 2011, held in Athens, Greece, in September 2011.
This book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014.
This is the first of a two-volume set (CCIS 373 and CCIS 374) that constitutes the extended abstracts of the posters presented during the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA, in July 2013, jointly with 12 other thematically similar conferences.