This book reports on advances in mechanical engineering, with a special emphasis on innovative design approaches, constructions and working processes, and on intelligent devices.
Every three years, researchers with interest and expertise in transport survey methods meet to improve and influence the conduct of surveys that support transportation planning, policy making, modelling, and monitoring related issues for urban, regional, intercity, and international person, vehicle, and commodity movements.
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the interconnected and often critical nature of these systems.
"e;Narrative Inquirers in the Midst of Meaning-making: Interpretive Acts of Teacher Educators"e; illustrates interim narrative field texts of identity as "e;teacher educator stories"e; and demonstrates how researchers utilize common places of temporality, sociality, and place in analyzing narratives.
Culturally Responsive Methodologies puts forward a new position from which to navigate our research in the hope that we can contribute to a more respectful and humble way of working with all peoples.
Implement decentralized blockchain applications to build scalable DappsKey FeaturesUnderstand the blockchain ecosystem and its terminologiesImplement smart contracts, wallets, and consensus protocolsDesign and develop decentralized applications using Bitcoin, Ethereum, and HyperledgerBook DescriptionThe Blockchain is a revolution promising a new world without middlemen.
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.
Artistic Research: Charting a Field in Expansion provides a multidisciplinary overview of different discourses and practices, exploring cutting-edge questions from the burgeoning field of artistic research.
As digital transformations continue to accelerate in the world, discourses of big data have come to dominate in a number of fields, from politics and economics, to media and education.
This volume focuses on the ethics of internet and social networking research exploring the challenges faced by researchers making use of social media and big data in their research.
Fintech veteran and venture capitalist, Arunkumar Krishnakumar, cuts through the hype to bring us a first-hand look into how quantum computing and Blockchain together could redefine industries and life as we know it.
Considering the tangible implications the present focus on research output poses for early career researchers, it is strange that perspectives from this group are rarely, if ever, included in the ongoing debates in the field.
A practical blockchain handbook designed to take you through implementing and re-engineering banking and financial solutions and workflows using eight step-by-step projectsKey FeaturesImplement various end-to-end blockchain projects and learn to enhance present-day financial solutionsUse Ethereum, Hyperledger, and Stellar to build public and private decentralized applicationsAddress complex challenges faced in the BFSI domain using different blockchain platform servicesBook DescriptionBlockchain technology will continue to play an integral role in the banking and finance sector in the coming years.
A complete guide to understanding, developing, and testing popular security-token smart contractsKey FeaturesUnderstand key Blockchain and Ethereum platforms conceptsStep-by-step guide to developing STO smart contracts on EthereumMonetize digital tokens under various U.
The use of genetics for the resolution of legal conflicts has recently been gaining a higher profile, largely as a result of scientific and technological advancements and the substantial broadening of applications.
Develop your cybersecurity knowledge to obtain CCNA Cyber Ops certification and gain professional skills to identify and remove potential threatsKey FeaturesExplore different security analysis tools and develop your knowledge to confidently pass the 210-255 SECOPS examGrasp real-world cybersecurity skills such as threat analysis, event correlation, and identifying malicious activityLearn through mock tests, useful tips, and up-to-date exam questionsBook DescriptionCybersecurity roles have grown exponentially in the IT industry and an increasing number of organizations have set up security operations centers (SOCs) to monitor and respond to security threats.
Within a technological context, this volume addresses contemporary theories of consciousness, subjective experience, the creation of meaning and emotion, and relationships between cognition and location.
In the next wave of conduct regulation in financial markets, from 2021 conduct regulators in the UK and elsewhere expect firms to produce evidence on how they are improving behaviour and culture.
Information security primarily serves these six distinct purposes-authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation.
The book presents selected papers from NIELIT's International Conference on Communication, Electronics and Digital Technology (NICEDT-2024) held during 16-17 February 2024 in Guwahati, India.
The book presents selected papers from NIELIT's International Conference on Communication, Electronics and Digital Technology (NICEDT-2024) held during 16-17 February 2024 in Guwahati, India.
Advances in narrow artificial intelligence make possible agentive systems that do things directly for their users (like, say, an automatic pet feeder).
This new edition provides a step-by-step guide to applying the Rasch model in R, a probabilistic model used by researchers across the social sciences to measure unobservable ("e;latent"e;) variables.
"e;This new edition retains the excellent structure and tone of previous editions whilst bringing the text and examples up to date, reflecting the changing and dynamic social world we live and research in.
A Practical Research Process for Developing a Sustainable Built Environment in Emerging Economies aims to fill the dearth of practical research guidance and reference material with specific focus on the built environment in developing countries.
236 pages, 666 images, 21 contributorsIn cases of sexual assault, it is important that investigators and care providers be able to respond quickly and appropriately in examining survivors, not only to ensure their health and safety but also to preserve any physical evidence left by the perpetrator.
232 pages, 555 images, 25 contributorsWhile examining suspected sexual assault survivors, it is important that investigators be able to accurately assess not only for those findings indicative of assault but also for normal or otherwise nonassaultive findings.
This book discusses and compares several new trends that can be used to overcome Moore's law limitations, including Neuromorphic, Approximate, Parallel, In Memory, and Quantum Computing.
At any time, public schools labor under great economic, political, and social pressures that make it difficult to create large-scale, 'whole school' change.
This monograph presents a new analytical approach to the design of proportional-integral-derivative (PID) controllers for linear time-invariant plants.
This book presents research results of PowerWeb, TU Delft's consortium for interdisciplinary research on intelligent, integrated energy systems and their role in markets and institutions.
This book explores potentially disruptive and transformative healthcare-specific use cases made possible by the latest developments in Internet of Things (IoT) technology and Cyber-Physical Systems (CPS).
This volume constitutes the refereed proceedings of the 4th International Conference on Digital Transformation and Global Society, DTGS 2019, held in St.
This book constitutes revised papers from the 12th International Conference on Large-Scale Scientific Computing, LSSC 2019, held in Sozopol, Bulgaria, in June 2019.