Do you want to gain a deeper understanding of how big tech analyses and exploits our text data, or investigate how political parties differ by analysing textual styles, associations and trends in documents?
This book gathers selected research articles presented in the "e;6th International Conference on Mathematical Modelling, Applied Analysis and Computation (ICMMAAC)"e;, held at JECRC University, Jaipur, during August 3-5, 2023.
Advances in our ability to analyse information from skeletal remains and subsequent developments in the field of forensic anthropology make it possible to identify more victims of homicides, mass-fatality disasters, and genocide.
Linking the murders of an alleged serial killer to successfully present a case in court involves a specific methodology that has been scrutinized by the judicial system but is largely absent in the current literature.
The third edition of this popular volume continues to supply an up-to-date, nuts-and-bolts learning tool for students and an everyday reference for investigative professionals at all levels.
Drawing on the expertise of several well-known figures in the medical, neuropsychological, and legal professions, Forensic Evaluation of Traumatic Brain Injury: A Handbook for Clinicians and Attorneys, Second Edition provides a concise, general overview of the forensic assessment process and the issues surrounding Traumatic Brain Injury (TBI).
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection.
The Legacy of 9/11 is a retrospective about how policing, intelligence, and counter-terrorism have changed in the more than twenty years since the September 11, 2001 terrorist attacks.
The Legacy of 9/11 is a retrospective about how policing, intelligence, and counter-terrorism have changed in the more than twenty years since the September 11, 2001 terrorist attacks.
This edited collection provides an overview of the recent developments in computational social science related to China studies and presents interdisciplinary empirical work from diverse scholars on culture, public opinion, and education using advanced computational methods and big data.
This edited collection provides an overview of the recent developments in computational social science related to China studies and presents interdisciplinary empirical work from diverse scholars on culture, public opinion, and education using advanced computational methods and big data.
This book explores the role and function of instructional designers in higher education, highlighting the real-world discrepancy between their actual contributions to organizational growth and the official job descriptions provided by universities.
This book explores the role and function of instructional designers in higher education, highlighting the real-world discrepancy between their actual contributions to organizational growth and the official job descriptions provided by universities.
This textbook explores recent research on the topics of gender inequalities, intergenerational support, and family in select East Asian societies, including China, Hong Kong, Taiwan, and Japan.
This textbook explores recent research on the topics of gender inequalities, intergenerational support, and family in select East Asian societies, including China, Hong Kong, Taiwan, and Japan.
Meaningful Journeys is an edited collection of autoethnographies underpinned by the conceptual, philosophical, and etymological origins of 'journeying,' 'questing,' and traditional and modern understandings of 'pilgrimage.
First published in 1985, Investigating Rape examines practices related with rape in four United States police departments and suggests what lessons the British police service might draw from them.
Meaningful Journeys is an edited collection of autoethnographies underpinned by the conceptual, philosophical, and etymological origins of 'journeying,' 'questing,' and traditional and modern understandings of 'pilgrimage.
First published in 1985, Investigating Rape examines practices related with rape in four United States police departments and suggests what lessons the British police service might draw from them.
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science.
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science.
This concise volume, using examples of psychotherapy talk, showcases the potential applications of data analytics for advancing discourse research and other related disciplines.
This concise volume, using examples of psychotherapy talk, showcases the potential applications of data analytics for advancing discourse research and other related disciplines.
Drawn from recent proceedings of the International Police Executive Symposium (IPES), this volume explores major policing initiatives and evolutions across the globe and presents practical insights on how police are retooling their profession.
Autoethnography Pedagogy and Practice supports and generates new insights into how autoethnography can be taught, supervised and practised by sharing the experiences and reflections of researchers from a wide range of fields and disciplines.
This book provides a comprehensive review on tensor algebra, including tensor products, tensor unfolding, tensor eigenvalues, and tensor decompositions.
This book provides a comprehensive review on tensor algebra, including tensor products, tensor unfolding, tensor eigenvalues, and tensor decompositions.
This book provides a methodology, grounded in prior research, for analyzing supply chain vulnerabilities and determining appropriate strategic sourcing approaches firms can adopt for managing risk and ensuring supply chain resilience.
This book provides a methodology, grounded in prior research, for analyzing supply chain vulnerabilities and determining appropriate strategic sourcing approaches firms can adopt for managing risk and ensuring supply chain resilience.
This book discusses in a uniform way binary, ternary, and quaternary bent functions, while most of the existing books on bent functions refer to just binary bent functions.
This book discusses in a uniform way binary, ternary, and quaternary bent functions, while most of the existing books on bent functions refer to just binary bent functions.