Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This revised new edition gives a unique and broad coverage of basic laser-related phenomena that allow graduate students, scientists and engineers to carry out research in quantum optics and laser physics. It covers quantization of the electromagnetic field, quantum theory of coherence, atom-field interaction models, resonance fluorescence, quantum theory of damping, laser theory using both the master equation and the Langevin theory, the correlated emission laser, input-output theory with applications to non-linear optics, quantum trajectories, quantum non-demolition measurements and generation of non-classical vibrational states of ions in a Paul trap. This fourth edition provides a new chapter on weak measurement, as well as a new chapter on complementarity. There is also new material included for atom optics and new problems have been added. Each topic is presented in a unified and didactic manner, and is accompanied by specific problems and hints to solutions to deepen the knowledge.
This book delivers a brief introduction to misinformation, and various novel approaches for solving misinformation detection problems. It considers all kinds of false information as fake news or misinformation and uses the terms fake news and misinformation interchangeably, in text, images, audio and video. The primary purpose is to provide a foundation for the problems of misinformation or false content detection including various challenges and approaches to solve them. The book starts with an overall description of misinformation. It briefly introduces the history, various issues or challenges, reasons for creating and spreading misinformation, and its impact on individuals and society. The second chapter discusses prior works on misinformation detection and explores various datasets, recent advancements, and state-of-the-art mechanisms. Chapter three demonstrates that the presence of surprising content in a story draws instant attention and appeals to strong emotional stimuli, and subsequently explores the application of novelty and emotion in the misinformation detection domain. Next, chapter four first introduces multitasking and discusses its advantages, before developing a framework for joint learning of interrelated tasks such as emotion recognition, novelty detection, and misinformation detection. The fifth chapter explores various datasets and mechanisms leveraging multimodal information, and eventually explains the fusion mechanisms of text and image modalities to obtain an efficient multimodal feature that ultimately helps to classify multimedia fake news. Chapter six discusses how novelty and emotion can be helpful in multimodal misinformation detection. It shows that detecting misleading information is difficult without earlier knowledge about that particular news and explores the possible solutions to tackle this problem. Eventually, chapter seven introduces the concept of multilingualism and implements an effective neural model to detectfabricated multilingual information, which overcomes the research and development gap in misinformation detection for regional languages. The final chapter eight briefly summarizes the presented results. This book is mainly written for researchers and graduate students specializing in fake news search and detection, as well as for industry professionals who need to explore various dimensions of misinformation detection regardless of their past knowledge and experience.
The primary aim of this text is to help transition undergraduates to study graduate level mathematics. It unites real and complex analysis after developing the basic techniques and aims at a larger readership than that of similar textbooks that have been published, as fewer mathematical requisites are required. The idea is to present analysis as a whole and emphasize the strong connections between various branches of the field. Ample examples and exercises reinforce concepts, and a helpful bibliography guides those wishing to delve deeper into particular topics. Graduate students who are studying for their qualifying exams in analysis will find use in this text, as well as those looking to advance their mathematical studies or who are moving on to explore another quantitative science.Chapter 1 contains many tools for higher mathematics; its content is easily accessible, though not elementary. Chapter 2 focuses on topics in real analysis such as p-adic completion, Banach Contraction Mapping Theorem and its applications, Fourier series, Lebesgue measure and integration. One of this chapter's unique features is its treatment of functional equations. Chapter 3 covers the essential topics in complex analysis: it begins with a geometric introduction to the complex plane, then covers holomorphic functions, complex power series, conformal mappings, and the Riemann mapping theorem. In conjunction with the Bieberbach conjecture, the power and applications of Cauchy's theorem through the integral formula and residue theorem are presented.
This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the increased availability of powerful large language models (LLMs) and how they can be mitigated. It attempts to outrun the malicious attackers by anticipating what they could do. It also alerts LLM developers to understand their work's risks for cybersecurity and provides them with tools to mitigate those risks. The book starts in Part I with a general introduction to LLMs and their main application areas. Part II collects a description of the most salient threats LLMs represent in cybersecurity, be they as tools for cybercriminals or as novel attack surfaces if integrated into existing software. Part III focuses on attempting to forecast the exposure and the development of technologies and science underpinning LLMs, as well as macro levers available to regulators to further cybersecurity in the age of LLMs. Eventually, in Part IV, mitigation techniques that should allow safe and secure development and deployment of LLMs are presented. The book concludes with two final chapters in Part V, one speculating what a secure design and integration of LLMs from first principles would look like and the other presenting a summary of the duality of LLMs in cyber-security. This book represents the second in a series published by the Technology Monitoring (TM) team of the Cyber-Defence Campus. The first book entitled "Trends in Data Protection and Encryption Technologies" appeared in 2023. This book series provides technology and trend anticipation for government, industry, and academic decision-makers as well as technical experts.
The 2nd edition of this textbook features more than 100 pages of new material, including four new chapters, as well as an improved discussion of differential geometry concepts and their applications. The textbook aims to provide a comprehensive geometric description of Special and General Relativity, starting from basic Euclidean geometry to more advanced non-Euclidean geometry and differential geometry. Readers will learn about the Schwarzschild metric, the relativistic trajectory of planets, the deflection of light, the black holes, and the cosmological solutions like de Sitter, Friedman-Lemaître-Robertson-Walker, and Gödel ones, as well as the implications of each of them for the observed physical world. In addition, the book provides step-by-step solutions to problems and exercises, making it an ideal introduction for undergraduate students and readers looking to gain a better understanding of Special and General Relativity. In this new edition, a wide discussion on metric-affine theories of gravity and equivalent formulations of General Relativity is reported. The aim is presenting also topics which could be useful for PhD students and researchers studying General Relativity from an advanced point of view.
These proceedings offer an insightful exploration of integrating data analytics in system engineering. This book highlights the essential role of data in driving innovation, optimizing processes, and solving complex challenges in the field. Targeted at industry professionals, researchers, and enthusiasts, this book serves as a comprehensive resource, providing actionable insights and showcasing transformative applications of data in engineering. It is a must-read for anyone keen on understanding and participating in the ongoing evolution of system engineering in our data-centric world.
This book presents cutting-edge research and methodologies in software engineering, specifically focusing on systems and network systems. It showcases novel development approaches and network system optimizations, highlighting the field's dynamic evolution. The book is designed for experts, scholars, and professionals, offering insights and tools crucial for advancing the software engineering landscape. Its diverse content makes it an invaluable resource for seasoned professionals and those new to the field, inspiring and enriching readers' understanding of software engineering's future directions.
This book constitutes the Third International Challenge on Kidney and Kidney Tumor Segmentation, KiTS 2023, which was held in conjunction with the 26th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2023. The challenge took place in Vancouver, BC, Canada, on October 8, 2023. The 22 contributions presented in this book were carefully reviewed and selected from 29 submissions. This challenge aims to develop the best system for automatic semantic segmentation of kidneys, renal tumors and renal cysts.
This book covers the recent advancements in quantum research and nanotechnology. The chapters investigate the synthesis, design, and applications of quantum dots in nanocomposites, presenting a comprehensive exploration of their principles, manufacturing processes, and diverse applications in electronics, photonics, energy, medicine, and beyond. With a focus on both theoretical foundations and practical insights derived from recent research, the book delves into the distinctive quantum mechanical characteristics of quantum dots, diverse fabrication methods, and the various possibilities emerging from their combination with various matrices. This book offers a captivating blend of theoretical knowledge and practical observations.
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.
Based on original findings from research carried out in six low- and middle-income countries in Africa, Asia and Latin America, this book brings together conceptual and empirical analyses of private higher education and social and academic inequality, a topic largely unexplored in the social science literature, particularly on private higher education. Field surveys of different categories of actors in numerous private universities have combined common methods and tools in countries chosen for the differences in their social structures and the characteristics, organization and development of their private higher education systems. Based on these qualitative surveys, combined with available quantitative data on higher education, this book analyzes the production and reproduction of social and academic inequalities in countries as diverse as Argentina, Malaysia, Mexico, Peru, the Democratic Republic of Congo, Senegal and Vietnam. Finally, the historical and social structuringof the private education systems in the selected countries provides the framework for analyses that go beyond the traditional higher education demand/supply and public policy approaches to explore the perspective of the actors - institutional administrators, teaching staff and students.
This book constitutes the thoroughly refereed and revised selected papers from the 12th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2023, held in Lisbon, Portugal, during February 22-24, 2023. The 28 full papers and 42 short papers included in this book were carefully reviewed and selected from 157 submissions. They were organized in topical sections as follows: theory and methods and applications.
This volume constitutes revised selected papers of several workshops, the EDOC Forum and the Demonstrations and Doctoral Consortium track, which were held in conjunction with the 27th International Conference on Enterprise Design, Operations, and Computing, EDOC 2023, in Groningen, The Netherlands, during October 30-November 3, 2023. The 18 revised full papers and 7 short papers presented in this book were carefully reviewed and selected from 37 submissions. They stem from the following satellite events: - Workshop on Intelligent Digital Architecture, Methods, and Services for Industry 4.0 and Society 5.0 (IDAMS)- Workshop on Empirical Methodologies for Research in Enterprise Architecture and Service-Oriented Computing (iRESEARCH)- Workshop on the Modelling and Implementation of Digital Twins for Complex Systems (MIDas4CS)- Workshop on Service-oriented Enterprise Architecture for Enterprise Engineering (SoEA4EE)- EDOC Forum- Demonstrations Track- Doctoral Consortium
The role of library and information sciences (LIS) in, for, and about Arctic and Northern studies is underexplored. This book examines the intersection of LIS and Arctic/Northern scholarship, research, and study by considering the Arctic and North as a global information-knowledge society; demonstrates practical and applied ways that librarians, archivists, curators, and other information scholars and professionals can participate and have participated in real activities within Arctic and Northern environments; explains how LIS - as a discipline focused on data, information, and knowledge - has a significant role to play in Arctic and Northern endeavours; and emphasises the inter-/multi- disciplinary nature of what are Arctic studies and Northern studies and the placement of LIS into that structure. Even though LIS has historically been overlooked in Northern and Arctic matters, this book suggests that LIS is in a remarkable position to add value to future Arctic/Northern studies. Thisbook is of interest to scientists, researchers, scholars, educators, professionals, and students globally working in Northern and Arctic contexts and/or with Northern and Arctic pursuits in mind.
This book offers accessible probabilistic modelling of relevant financial problems. It is divided into two parts. The first part (cookbook) is written by emphasizing the key definitions and theorems without wasting too much of the reader with unnecessary technical details. Here, the first kind of target audience is graduate students in Economics with no prior exposition to probability theory (except for undergraduate courses in Applied Statistics) which are provided by a self-contained account of probabilistic modelling mainly applied to finance. The fundamental concepts of random variable/vector and probability distributions are introduced beforehand with respect to the usual treatment of this subject in standard probability textbook, trying to strike a balance between precise mathematical definitions and their applied knowledge. All the analytic tools developed are illustrated through examples of probability distributions of future stock prices, returns and profit and loss, together with their main characteristics, such as moments, moment generating and characteristic functions, location-scale families, and quantiles. The extension to the multivariate case for fixed time horizons is presented, together with the fundamentals of stochastic processes both in discrete and continuous time as candidate models for asset prices and return dynamics. Convergence concepts are presented as applied to the problem of point estimation of means, variances, correlation coefficients and risk measures. Short sections on risk and copula functions, further illustrate the potential application of probability models to financial problems. The second part of the book can be accessed by those students with more mathematical preparation. All the relevant proofs of results which are only stated in the first part and some advanced exercises with complete solutions are presented.
This book offers a comprehensive overview of atomically precise electrocatalysts, including single-atom, dual-atom, and multi-atom catalysts, which are considered to be superior electrode materials for fuel cells and water electrolyzers. By presenting a systematic examination of these materials in ascending order of metal atom number, the book provides a deep understanding of their synthesis processes, energy applications, and potential for improving their performance. Unlike any contemporary book on the topic, this book explores the reaction mechanisms and structure-performance relationships in catalytic processes at atomic level. Essentially, by driving the development of fuel cells and water electrocatalyzers, this book helps meet the world's growing energy demands. With its cutting-edge insights, this book is an indispensable resource for researchers, engineers, and students working in the field of renewable energy.
This book explores the need for innovative approaches to administrative digitization, leveraging technologies such as AI, blockchain, and smart processes to meet citizens' expectations, with a particular focus on the role of Chief Digital Officers (CDOs) in driving successful digital transformations within public institutions. Administrative digitization requires fresh inputs to match the leaps seen in the industry sector, utilizing technologies like AI-driven automation, blockchain transactions, and security tools. Smart process solutions are seen as transformative in upholding service standards aligned with citizens' state expectations. Unlike commercial companies, collaboration offers those overseeing public sector digitization enhanced scaling opportunities by drawing from experiences in other regions and metropolises, directly applicable and reusable. In the public realm, digital strategies mirror legal and social conditions, necessitating adjustments and adaptation options for Chief Digital Officers as they lead digital transformation. Methodological focal points in task structure redesign, process optimization, and motivating actors yield diverse action areas for the CDO's new role in public institutions. This book explores the instruments, strategies, and attitudes necessary to successfully implement transformative initiatives in organizations, emphasizing proven concepts with practical applicability, enabling readers to derive their own interaction options as digital guidance leaders. The book is a concise introduction to the specific requirements for visionary designers driving dynamic changes in user-centric public services.
This book constitutes the proceedings of the 45th Annual Conference of the German Association for Pattern Recognition, DAGM-GCPR 2023, which took place in Heidelberg, Germany, during September 19-22, 2023. The 40 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Segmentation and action recognition; 3D reconstruction and neural rendering; Photogrammetry and remote sensing; Pattern recognition in the life sciences; Interpretable machine learning; Weak supervision and online learning; Robust models.
This book presents machine learning approaches to identify the most important predictors of crucial variables for dealing with the challenges of managing production units and designing agriculture policies. The book focuses on the agricultural sector in the European Union and considers statistical information from the Farm Accountancy Data Network (FADN).Presently, statistical databases present a lot of information for many indicators and, in these contexts, one of the main tasks is to identify the most important predictors of certain indicators. In this way, the book presents approaches to identifying the most relevant variables that best support the design of adjusted farming policies and management plans. These subjects are currently important for students, public institutions and farmers. To achieve these objectives, the book considers the IBM SPSS Modeler procedures as well as the respective models suggested by this software.The book is read by students in production engineering, economics and agricultural studies, public bodies and managers in the farming sector.
This book celebrates and explores some philosophical issues raised by the work of Alan Weir, who is Professor Emeritus at the University of Glasgow, having previously held positions at the Universities of Oxford, Edinburgh and Queen's, Belfast. In a number of areas, Weir has elaborated strikingly original views which involve a radical departure from the mainstream. These include formalism in the philosophy of mathematics, and as well as naïve set theory, with a universal set, and a naïve theory of truth. In contrast to other contemporary defenders of the latter two theories, Weir rejects dialetheism and accepts classical rules for the logical connectives. He avoids contradictions by restricting certain structural inference rules, specifically some generalized versions of transitivity. In addition, Weir has developed radical versions of naturalism and physicalism (partly informed by his work on Quine) and perceptual realism. This collection includes contributions by a distinguished group of philosophers on Weir's philosophy, as well as a memoir and a new essay on the philosophy of mathematics by Weir himself.
This is an updated version of what is still the only text to address basic questions about how to model uncertainty in mathematical programming, including how to reformulate a deterministic model so that it can be analyzed in a stochastic setting. This second edition has important extensions regarding how to represent random phenomena in the models (also called scenario generation) as well as a new chapter on multi-stage models. This text would be suitable as a stand-alone or supplement for a second course in OR/MS or in optimization-oriented engineering disciplines where the instructor wants to explain where models come from and what the fundamental modeling issues are. The book is easy-to-read, highly illustrated with lots of examples and discussions. It will be suitable for graduate students and researchers working in operations research, mathematics, engineering and related departments where there is interest in learning how to model uncertainty. Alan King is a Research Staff Member at IBM's Thomas J. Watson Research Center in New York. Stein W. Wallace is a Professor of Operational Research and head of Center for Shipping and Logistics at NHH Norwegian School of Economics, Bergen, Norway.
The three-volume set LNICST 561, 562 563 constitutes the refereed post-conference proceedings of the 19th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2023, held in Corfu Island, Greece, during October 4-6, 2023. The 72 full papers presented in these proceedings were carefully reviewed and selected from 176 submissions. The papers are organized in the following topical sections: Volume I: Collaborative Computing, Edge Computing & Collaborative working, Blockchain applications, Code Search and Completion, Edge Computing Scheduling and Offloading.Volume II: Deep Learning and Application, Graph Computing, Security and Privacy Protection and Processing and Recognition.Volume III: Onsite Session Day2, Federated learning and application, Collaborative working, Edge Computing and Prediction, Optimization and Applications.
The three-volume set LNICST 561, 562 563 constitutes the refereed post-conference proceedings of the 19th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2023, held in Corfu Island, Greece, during October 4-6, 2023. The 72 full papers presented in these proceedings were carefully reviewed and selected from 176 submissions. The papers are organized in the following topical sections: Volume I: Collaborative Computing, Edge Computing & Collaborative working, Blockchain applications, Code Search and Completion, Edge Computing Scheduling and Offloading.Volume II: Deep Learning and Application, Graph Computing, Security and Privacy Protection and Processing and Recognition.Volume III: Onsite Session Day2, Federated learning and application, Collaborative working, Edge Computing and Prediction, Optimization and Applications.
The three-volume set LNICST 561, 562 563 constitutes the refereed post-conference proceedings of the 19th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2023, held in Corfu Island, Greece, during October 4-6, 2023. The 72 full papers presented in these proceedings were carefully reviewed and selected from 176 submissions. The papers are organized in the following topical sections: Volume I: Collaborative Computing, Edge Computing & Collaborative working, Blockchain applications, Code Search and Completion, Edge Computing Scheduling and Offloading.Volume II: Deep Learning and Application, Graph Computing, Security and Privacy Protection and Processing and Recognition.Volume III: Onsite Session Day2, Federated learning and application, Collaborative working, Edge Computing and Prediction, Optimization and Applications.
This volume comprises selected papers presented at the 14th International Conference on Scientific Computing in Electrical Engineering, SCEE 2022, held in Amsterdam, The Netherlands, in July 2022. The aim of the SCEE 2022 conference was to bring together scientists - mathematicians, electrical engineers, computer scientists, and physicists, from universities and industry - to have in-depth discussions of the latest scientific results in Computational Science and Engineering relevant to Electrical Engineering and to stimulate and inspire active participation of young researchers.This extensive reference work is divided into four parts: Part I Circuit Simulation and Design.- Part II Device Simulation.- Part III Computational Electromagnetics.- Part IV Mathematical and Computational Methods. Each part starts with a general introduction, followed by the respective contributions. The book will appeal to mathematicians and electricalengineers. Further, it introduces algorithm and program developers to recent advances in the other fields, while industry experts will be introduced to new programming tools and mathematical methods.
This new edition builds upon the foundational knowledge covered in the first edition, covering the epidemiology, pathogenesis, and clinical presentation of atopic dermatitis in both pediatric and adult patients. It provides an overview of the mechanism and presentation of atopic dermatitis and focuses on the management methods experienced dermatologists have used to successfully manage atopic dermatitis. The book includes new chapters describing the special considerations for atopic dermatitis in skin of color patients, dedicated chapters on topical and oral prescription management reflected the latest FDA-approved treatments, and also a chapter covering the updated guidelines from the American Academy of Dermatology. A final chapter includes updates on the future of atopic dermatitis treatment.This book provides physicians with insights into the management of atopic dermatitis, such as alternative treatments for pruritus, psychosocial impact on patients and families,assessing patient compliance, and patient resources.
This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as they evolve. Integrating AI into cybersecurity not only offers enhanced defense mechanisms, but this book introduces a paradigm shift illustrating how one conceptualize, detect and mitigate cyber threats. An in-depth exploration of AI-driven solutions is presented, including machine learning algorithms, data science modeling, generative AI modeling, threat intelligence frameworks and Explainable AI (XAI) models. As a roadmap or comprehensive guide to leveraging AI/XAI to defend digital ecosystems against evolving cyber threats, this book provides insights, modeling, real-world applications and research issues. Throughout this journey, the authors discover innovation, challenges, and opportunities. It provides a holistic perspective on the transformative role of AI in securing the digital world.Overall, the useof AI can transform the way one detects, responds and defends against threats, by enabling proactive threat detection, rapid response and adaptive defense mechanisms. AI-driven cybersecurity systems excel at analyzing vast datasets rapidly, identifying patterns that indicate malicious activities, detecting threats in real time as well as conducting predictive analytics for proactive solution. Moreover, AI enhances the ability to detect anomalies, predict potential threats, and respond swiftly, preventing risks from escalated. As cyber threats become increasingly diverse and relentless, incorporating AI/XAI into cybersecurity is not just a choice, but a necessity for improving resilience and staying ahead of ever-changing threats. This book targets advanced-level students in computer science as a secondary textbook. Researchers and industry professionals working in various areas, such as Cyber AI, Explainable and Responsible AI, Human-AI Collaboration, Automation and Intelligent Systems, Adaptive and Robust Security Systems, Cybersecurity Data Science and Data-Driven Decision Making will also find this book useful as reference book.
This book explores various technical domains, including industrial engineering, computer sciences, process engineering, and system engineering, seamlessly integrated with management theories. It explores how this fusion of knowledge can drive improvements, transformations, and the design of new processes, products, or organizational structures, ultimately generating significant value for both society and the market. The book introduces the concept of management engineering and delves into its implementation process, including the development of new methodologies or frameworks designed to solve complex problems effectively. It provides a comprehensive perspective on the evolution of management engineering, presenting the most relevant strategies for assimilating this approach to generate value, especially in the context of emerging economies.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.