Threat and Violence Interventions: The Effective Application of Influence evaluates threat and violence risk for various levels of mental health practitioners, law enforcement officers, security professionals, human resource professionals, attorneys, and academics in forensic psychology, sociology, criminology and law.
This book highlights cutting-edge research in network science, offering scientists, researchers, students, and practitioners a unique update on the latest advances in theory and a multitude of applications.
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2021, held in Kristiansand, Norway, in August 2021.
The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023.
In this thought-provoking volume, Eran Fisher interrogates the relationship between algorithms as epistemic devices and modern notions of subjectivity.
Based on a streamlined presentation of the authors' successful work Linear Systems, this textbook provides an introduction to systems theory with an emphasis on control.
Death, Decomposition, and Detector Dogs: From Science to Scene is designed to help police investigators and Human Remains Detection K9 handlers understand the basics of forensic taphonomy (decomposition) and how to most effectively use a human remains detection (HRD) K9 as a locating tool.
This book addresses the problem of accurate state estimation in nonlinear continuous-time stochastic models with additive noise and discrete measurements.
The interest in control of nonlinear partial differential equation (PDE) sys- tems has been triggered by the need to achieve tight distributed control of transport-reaction processes that exhibit highly nonlinear behavior and strong spatial variations.
This book provides an overview of the basic concepts of a systems theoretical perspective using families and family therapy as examples and illustrations of their application in professional practice.
This book constitutes the refereed proceedings of the Second International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2020, held in Bizerte, Tunisia, in December 2020.
This two-volume set LNAI 14810-14811 constitutes the refereed proceedings of the 16th International Conference on Computational Collective Intelligence, ICCCI 2024, held in Leipzig, Germany, during September 9-11, 2024.
This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020), held in Shanghai, China, on November 6, 2020.
Digital Audio Forensics Fundamentals offers an accessible introduction to both the theory and practical skills behind this emerging field of forensic science.
With rise of smart medical sensors, cloud computing and the health care technologies, "e;connected health"e; is getting remarkable consideration everywhere.
A comprehensive review of the latest fingerprint development and imaging techniques With contributions from leading experts in the field, Fingerprint Development Techniques offers a comprehensive review of the key techniques used in the development and imaging of fingerprints.
This book contains extended versions of the best papers presented at the First International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2019, held in Hammamet, Tunisia, in October 2019.
The extraordinary development of digital computers (microprocessors, microcontrollers) and their extensive use in control systems in all fields of applications has brought about important changes in the design of control systems.
Digital elements such as signal processors, microcontrollers or industrial PCs are widely used for filtering and control of continuous-time processes or plants.
This book constitutes the refereed proceedings of the 18th International Symposium on Automated Technology for Verification and Analysis, ATVA 2020, held in Hanoi, Vietnam, in October 2020.
A practical introduction to network science for students across business, cognitive science, neuroscience, sociology, biology, engineering and other disciplines.
NS-2 is an open-source discrete event network simulator which is widely used by both the research community as well as by the people involved in the standardization protocols of IETF.
The use of third-party funding in the UK has been increasing and has moved into the mainstream as a funding option for clients involved in litigation, particularly following on from the positive endorsement of litigation funding by Lord Justice Jackson in his Review of Civil Litigation Costs where he said: 'I remain of the view that, in principle, third-party funding is beneficial and should be supported.
The main challenge in the study of nonautonomous phenomena is to understand the very complicated dynamical behaviour both as a scientific and mathematical problem.
This book aims to promote the core understanding of a proper modelling of road traffic accidents by deep learning methods using traffic information and road geometry delineated from laser scanning data.
This in-depth case study of a mid-sized police department captures the dynamics, struggles, and successes of police change, revealing the positive organizational and community outcomes that resulted from a persistent drive to reinvent public safety and community relationships.
This volume of the Encyclopedia of Complexity and Systems Science, Second Edition, focuses on current challenges in the field from materials and mechanics to applications of statistical and nonlinear physics in the life sciences.
This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions.
The five-volume set CCIS 1832-1836 contains the extended abstracts of the posters presented during the 25th International Conference on Human-Computer Interaction, HCII 2023, which was held as a hybrid event in Copenhagen, Denmark, in July 2023.
Forensic Engineering, the latest edition in the Advanced Forensic Science series that grew out of recommendations from the 2009 NAS Report: Strengthening Forensic Science: A Path Forward, serves as a graduate level text for those studying and teaching digital forensic engineering, as well as an excellent reference for a forensic scientist's library or for their use in casework.
This two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and Communications Security, ICICS 2021, held in Chongqing, China, in September 2021.
A cooperative system is defined to be multiple dynamic entities that share information or tasks to accomplish a common, though perhaps not singular, objective.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis.
Wireless Connectivity: An Intuitive and Fundamental Guide Wireless connectivity has become an indispensable part, a commodity associated with the way we work and play.
Focusing on the theory of shadowing of approximate trajectories (pseudotrajectories) of dynamical systems, this book surveys recent progress in establishing relations between shadowing and such basic notions from the classical theory of structural stability as hyperbolicity and transversality.