Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This book provides a state-of-the-art review of recent analytical developments on multi-outlets pipe flow hydraulics and alternative hydraulic design concepts. For this purpose, the book presents simple, but sufficiently accurate analytical equations, that can be applied directly without needing any numerical technique to achieve whole hydraulic computations. The analytical procedures explained here give an opportunity for designers to better understand the basic hydraulic principles of multi-outlet pipe flow, and demonstrate their applicability and efficiency to design problems of multi-outlet sub-main lines, covering various design configurations.
The metaverse, a hybrid society of the real and the virtual is attracting significant attention from academia to industry and is starting to change the world. Composed of ten chapters, this book introduces the metaverse from three aspects ¿ concept, content and context. It starts with numerous concepts related to the metaverse, such as virtual reality, augmented reality, Web 3.0 and NFTs and describes the background, features, advantages and disadvantages. It then presents the content or key techniques around the metaverse, Artificial Intelligence, big data, edge computing, 3D modeling and blockchain. For each technique, it depicts how it performs to advance the development of the metaverse. Finally, it gives the context of the metaverse and illustrates the new society in the virtual world, consisting of economic systems, assets, social activities, security, law, etcetera. Overall, Metaverse: Concept, Content and Context provides a panoramic view of the metaverse, a key feature of which is the intuitive visualizations with numerous figures that clearly address the main aspects. This book is well-designed and well-written and will appeal to beginners and students as well as professionals, welcome to the metaverse community!
This book provides a concise introduction to additive manufacturing, accessible to anyone with a basic background in engineering and materials science. The author explains additive manufacturing (AM) in terms of advantages and disadvantages and gives a concise list of advantages and disadvantages, enabling readers to understand AM in relation to other techniques. Additionally, this book clarifies various contradictions with the help of numerous examples.This book:Offers readers a unique, accelerated learning tool, revealing the subtleties of Additive ManufacturingDescribes a concept for refabrication in the context of additive manufacturing, providing new insight into repair and refurbishmentDiscusses additive manufacturing not only as a design tool, but also a production tool in the context of mass-production
This book offers readers a series of robotic methods for manipulating zebrafish larva, one of the most popular model vertebrates widely used in biomedical research and clinical applications. The authors leverage advanced control theories, image processing algorithms, and artificial intelligence to establish a robot-assisted automated or semi-automated zebrafish larva-targeted micromanipulation system for different experimental purposes. The methods presented are generic and can be translated to manipulate other types of biological objects, such as embryos or cells. Coverage includes topics that span the procedures of manipulating zebrafish larva, such as in-plane positioning, three-dimensional orientation, deformation-controllable immobilization, organ-targeted microinjection, whole-organism imaging, and high-throughput trajectory tracking of zebrafish larvae group movement.Robotic Micromanipulation of Zebrafish Larva is written in a simple, clear, and easy-to-read style. It is an ideal reference for academic researchers and biomedical operators. It is also a valuable resource for students learning robotics, control and system theories, image processing, artificial intelligence, and biomedical engineering.
This open access book foregrounds novel collaborations between the Social Sciences and Humanities (SSH), and Science, Technology, Engineering and Mathematics (STEM) disciplines, for the benefit of European energy policy. Each chapter has been led by a team spanning social and technical disciplines. The book proposes 10 policy recommendations to: Simplify the uptake of community energy; Prioritise societal engagement in geothermal; Create co-learning for energy communities; Facilitate energy literacy; Support place-based strategies for retrofit; Promote integrated policy design for agrivoltaics; Increase social acceptability of low-carbon technologies; Protect digital energy infrastructure; Understand stakeholder perceptions of energy-efficiency measures; and Rethink energy system models to support the just transition. It will be of interest to anyone developing, implementing or critiquing energy policy (locally, nationally or internationally) as well as those looking to expand the use of interdisciplinary research to achieve sustainability goals. Part of a three-volume collection covering climate, energy, and mobility policy.
This open access book deals with the backsliding of the rule of law in Poland and Hungary as one of the main problems of the EU. What began as a national phenomenon has become a general threat for the EU because the respect for the rule of law is a prerequisite for all other values of the EU enshrined in Article 2 of the Treaty on European Union. Media coverage and scholarly publications on these developments mainly focus on backsliding governments and judicial decisions concerning the issue. This book aims to inform the debate by adding another perspective and providing a broader view. Drawing on a comprehensive collection of parliamentary debates, we explore how MPs in Poland, Hungary, but also the Czech Republic, Slovakia and Romania referred to the rule of law from 1990 to 2021 and how their narratives differed across parties, countries and time.
This book offers a leisurely introduction to the concepts and methods of machine learning. Readers will learn about classification trees, Bayesian learning, neural networks and deep learning, the design of experiments, and related methods. For ease of reading, technical details are avoided as far as possible, and there is a particular emphasis on applicability, interpretation, reliability and limitations of the data-analytic methods in practice. To cover the common availability and types of data in engineering, training sets consisting of independent as well as time series data are considered. To cope with the scarceness of data in industrial problems, augmentation of training sets by additional artificial data, generated from physical models, as well as the combination of machine learning and expert knowledge of engineers are discussed.The methodological exposition is accompanied by several detailed case studies based on industrial projects covering a broad range of engineering applications from vehicle manufacturing, process engineering and design of materials to optimization of production processes based on image analysis.The focus is on fundamental ideas, applicability and the pitfalls of machine learning in industry and science, where data are often scarce. Requiring only very basic background in statistics, the book is ideal for self-study or short courses for engineering and science students.
This book is a detailed teaching manual for training in microvascular and peripheral nerve surgery with step-by-step instructions using high-quality pictures and videos. It consists of valuable practical tips and tricks that are explained in detail to the readers, making it a useful tool for both inexperienced and experienced practitioners looking to improve their skills.Microsurgery has diverse clinical applications across multiple medical specialties. It is commonly employed in reconstructive surgery to address tissue defects following trauma, oncological resections, or congenital anomalies, utilizing precise procedures to reattach small blood vessels and nerves. This includes the replantation of amputated body parts such as fingers or hands, as well as the reconstruction of complex defects in the head and neck region, upper and lower extremities and breast among others. Microsurgical techniques are also crucial in nerve repair surgeries to restore function and sensation after trauma but as well in facial reanimation procedures to address paralysis; meanwhile lymphaticovenous anastomosis and vascularized lymph node transfers are useful procedures to treat or prevent lymphedema. Overall, microsurgery represents a cornerstone in modern medicine, offering innovative solutions for a wide range of clinical challenges.Microsurgery 101 - Tips and Tricks for Microvascular and Peripheral Nerve Repair Techniques is a unique guidebook for medical students, residents, fellows, and practicing surgeons from multiple specialties: plastic, hand and orthopedic, maxillofacial, head and neck, neurosurgery, transplant, ophthalmology, pediatric, cardiovascular, urology, gynecology, vascular, general surgery and veterinary surgery.
This textbook introduces the fundamental concepts and techniques used in biometric recognition to students, practitioners, and non-experts in the field. Specifically, the book describes key methodologies used for sensing, feature extraction, and matching of commonly used biometric modalities such as fingerprint, face, iris, and voice. In addition, it presents techniques for fusion of biometric information to meet stringent accuracy requirements, also discussing various security issues and associated remedies involved in the deployment of biometric systems. Furthermore, this second edition captures the progress made in the field of biometric recognition, with highlights including: Lucid explanation of core biometric concepts (e.g., individuality and persistence), which builds a strong foundation for more in-depth study and research on biometrics A new chapter on deep neural networks that provides a primer to recent advancements in machine learning and computer vision Illustrative examples of how deep neural network models have contributed to the rapid evolution of biometrics in areas such as robust feature representation and synthetic biometric data generation A new chapter on speaker recognition, which introduces the readers to person recognition based on the human voice characteristics Presentation of emerging security threats such as deepfakes and adversarial attacks and sophisticated countermeasures such as presentation attack detection and template securityWhile this textbook has been designed for senior undergraduate students and first-year graduate students studying a course on biometrics, it is also a useful reference guide for biometric system designers, developers, and integrators.
This book explores the concept of psychophysics and details the development of the ideas which made the mathematisation of desire possible. The experience of desire accompanies us all throughout life, but dealing with it as psychologists and scientists is far from easy. Psychophysics was conceived to help map, mathematically, these unknowable feelings of desire. As such, this book will help to provide an accessible account of psychophysics while telling the story of its creation, which was, in essence, the birth of scientific psychology and contemporary cognitive neuroscience, alongside many of the technologies which characterize the contemporary world. It is a strange and intriguing story, which begins with the German physiologist Ernst Heinrich Weber in the first half of the nineteenth century, and its story will help the reader gain fresh insight into how scientists came to be able to map and quantify complex and private emotional states.
This two-volume set LNAI 14844-14845 constitutes the refereed proceedings of the 22nd International Conference on Artificial Intelligence in Medicine, AIME 2024, held in Salt Lake City, UT, USA, during July 9-12, 2024.The 54 full papers and 22 short papers presented in the book were carefully reviewed and selected from 335 submissions.The papers are grouped in the following topical sections:Part I: Predictive modelling and disease risk prediction; natural language processing; bioinformatics and omics; and wearable devices, sensors, and robotics.Part II: Medical imaging analysis; data integration and multimodal analysis; and explainable AI.
The book discusses some of the issues related to proximity, challenges an acritical use of the concept and highlights several dimensions that may better frame the actual contribution of proximity to urban and mobility planning in different places. The contributions address the conditions required for ensuring accessibility by proximity and the different planning dimensions that can support its promotion, addressing issues related to the inclusiveness of this model, as well as the scalability and metrics of proximity we need to deal with in several different contexts. The first part of the book introduces some experimental approaches aimed at operationalising accessibility by proximity, while the second part discusses several planning issues related to the implementation of proximity at different scales.
This text presents selected applications of discrete-time stochastic processes that involve random interactions and algorithms, and revolve around the Markov property. It covers recurrence properties of (excited) random walks, convergence and mixing of Markov chains, distribution modeling using phase-type distributions, applications to search engines and probabilistic automata, and an introduction to the Ising model used in statistical physics. Applications to data science are also considered via hidden Markov models and Markov decision processes. A total of 32 exercises and 17 longer problems are provided with detailed solutions and cover various topics of interest, including statistical learning.
This open access book pertains to the "International Conference on Cultural Tourism Advances," held on June 27 and 28, 2023, at KU Leuven, Belgium. It focuses on advancing understanding of the sustainable development potential of cultural tourism by examining successful policy interventions, emerging cultural tourism trends, advancements in visitor management systems, new business and governance models, and the opportunities arising from ICT in the twenty-first century. This book presents recent key advances and their significant outcomes in the domain of European Cultural Tourism.
This book constitutes the refereed proceedings of the 2nd International Conference, ITMM 2023 and 14th International Workshop, WRQ 2023, held in Tomsk, Russia, during December 4¿9, 2023.The 23 full papers included in this book were carefully reviewed and selected from 96 submissions. The papers are devoted to new results in queueing theory and its applications, and also related areas of probabilistic analysis. Its target audience includes specialists in probabilistic theory, random processes, and mathematical modeling as well as engineers engaged in logical and technical design and operational management of data processing systems, communication, and computer networks.
This open access book is a groundbreaking exploration of systemic risk in modern financial systems. Through its theoretical and empirical investigations, it reveals the multidimensionality of systemic risk, the transmission channels of crises, and the interlinkages between physical, transition, and financial risks. It introduces cutting-edge methodologies, including prediction and optimization models based on complex networks, multilayer networks and eXplainable Artificial Intelligence (XAI) approaches, to forecast and measure systemic risk and financial crisis. It provides insight for academics, practitioners, policy and supervisory authorities, and bankers and financial market operators on understanding the links that determine the propagation of financial crises and the emergence of systemic risks. This book is essential for those wishing to better understand systemic risk and its implications.
This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed.A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT). The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence.This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading.
This book helps readers understand the basic concepts of electronic circuits. The emphasis is on amplifiers, filters and audio circuits. Other applications such as oscillators, multivibrators, logic and control circuits are also included. Although basic concepts are presented with the necessary theoretical background, the author uses descriptions of basic electronic circuits in a very compact form and the circuit functions are described in a very accessible manner.In addition, this book:Covers electronic applications in audio, power supply, oscillators, signal processing, filters and controlMinimizes theoretical background to what is necessary to understand the circuit dynamicsPresents a compact and easy-to-understand explanation of electronic circuits for wide range of applications
This is a book that covers different aspects of UAV technology, including design and development, applications, security and communication, and legal and regulatory challenges.The book is divided into 13 chapters, grouped into four parts. The first part discusses the design and development of UAVs, including ROS customization, structured designs, and intelligent trajectory tracking. The second part explores diverse applications such as search and rescue, monitoring distributed parameter systems, and leveraging drone technology in accounting. The third part focuses on security and communication challenges, including security concerns, multi-UAV systems, and communications security. The final part delves into the legal and regulatory challenges of integrating UAVs into non-segregated airspace.The book serves as a valuable resource for researchers, practitioners, and students in the field of unmanned aerial vehicles, providing a comprehensive understanding of UAV technology and its applications.
This textbook offers a detailed account of analytical models used to solve complex supply chain problems. It introduces a unique risk analysis framework that helps the reader understand the sources of uncertainties and use appropriate models to improve decisions in supply chains. This framework illustrates the complete supply chain for a product and demonstrates the supply chain's exposure to demand, supply, inventory, and financial risks. Step by step, this book provides a detailed examination of analytical methods that optimize operational decisions under different types of uncertainty. It discusses stochastic inventory models, introduces uncertainty modeling methods, and explains methods for managing uncertainty. To help readers deepen their understanding, it includes access to various supplementary material including an online interactive tool in Python.This book is intended for undergraduate and graduate students of supply chain managementwith a focus on supply chain analytics. It also prepares practitioners to make better decisions in this field.
This book presents applicable guidance into sensor system hardware and software design, extensions, and integration aimed at utilization of 1-wire networks. The content is structured from the design of the sensor system architecture-hardware and software-through the implementation and optimization of the solution to the practical verification. The hardware part consists of the design of specific solutions for sensor data collection and the design and integration of standard and special sensors into these solutions. The development of the hardware solutions is focused on integration with 32-bit microcontrollers with ARM Cortex M0 to Cortex M4 cores. For the sensor solutions, the focus is on design versatility and miniaturization of dimensions with respect to the availability of the technology in the physical design. The focus is on minimizing power consumption to the design of power independent modules. The presented solution includes the design and implementation of the software layer,which includes control software for direct communication with the sensor modules as well as an information system for continuous data storage and remote access. The book presents an extensive case study that describes the design and development of a 1-wire bus controller hardware module solution with proprietary modifications that achieve improvements to the maximum 1-wire bus length. The study also includes the design and implementation of a universal and power independent 1-wire bus device. Using this module, almost any sensor can be connected to the 1-wire bus.Provides a comprehensive look at the use of 1-wire networks, from the design of custom hardware to software solutions Describes 1-wire driver design issues such as the bus timing required to maintain compatibility with protocol structure Offers insight into practical applications implemented in several types of installation environments
This book overcomes the separation existing in literature between the static and the dynamic bifurcation worlds. It brings together buckling and post-buckling problems with nonlinear dynamics, the bridge being represented by the perturbation method, i.e., a mathematical tool that allows for solving static and dynamic problems virtually in the same way. The book is organized as follows: Chapter one gives an overview; Chapter two illustrates phenomenological aspect of static and dynamic bifurcations; Chapter three deals with linear stability analysis of dynamical systems; Chapter four and five discuss the general theory and present examples of buckling and post-buckling of elastic structures; Chapter six describes a linearized approach to buckling, usually adopted in the technical literature, in which pre-critical deformations are neglected; Chapters seven to ten, analyze elastic and elasto-plastic buckling of planar systems of beams, thin-walled beams and plate assemblies, respectively; Chapters eleven to thirteen, illustrate dynamic instability phenomena, such as flutter induced by follower forces, aeroelastic bifurcations caused by wind flow, and parametric excitation triggered by pulsating loads. Finally, Chapter fourteen discusses a large gallery of solved problems, concerning topics covered in the book. An Appendix presents the Vlasov theory of open thin-walled beams.The book is devoted to advanced undergraduate and graduate students, as well as engineers and practitioners. The methods illustrated here are immediately applicable to model real problems.The BookIntroduces, in a simple way, complex concepts of bifurcation theory, by making use of elementary mathematicsGives a comprehensive overview of bifurcation of linear and nonlinear structures, in static and dynamic fieldsContains a chapter in which many problems are solved, either analytically or numerically, and results commented
While GPS is the de-facto solution for outdoor positioning with a clear sky view, there is no prevailing technology for GPS-deprived areas, including dense city centers, urban canyons, buildings and other covered structures, and subterranean facilities such as underground mines, where GPS signals are severely attenuated or totally blocked. As an alternative to GPS for the outdoors, indoor localization using machine learning is an emerging embedded and Internet of Things (IoT) application domain that is poised to reinvent the way we navigate in various indoor environments. This book discusses advances in the applications of machine learning that enable the localization and navigation of humans, robots, and vehicles in GPS-deficient environments. The book explores key challenges in the domain, such as mobile device resource limitations, device heterogeneity, environmental uncertainties, wireless signal variations, and security vulnerabilities. Countering these challenges can improve theaccuracy, reliability, predictability, and energy-efficiency of indoor localization and navigation. The book identifies severalnovel energy-efficient, real-time, and robust indoor localization techniques that utilize emerging deep machine learning and statistical techniques to address the challenges for indoor localization and navigation. In particular, the book:Provides comprehensive coverage of the application of machine learning to the domain of indoor localization;Presents techniques to adapt and optimize machine learning models for fast, energy-efficient indoor localization;Covers design and deployment of indoor localization frameworks on mobile, IoT, and embedded devices in real conditions.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.