Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This two-volume set, CCIS 2068 and 2069, constitutes selected papers presented during the Second Pan-African Conference on Artificial Intelligence, PanAfriCon AI 2023, held in Addis Ababa, Ethiopia, in October 2023. The set goal of the conference is to exchange the best practices of joint Pan-African efforts to provide solutions for Africa's key 21st century challenges in the social, economic and ecologic domains. The 29 papers were thoroughly reviewed and selected from 134 submissions. The papers are organized in the following topical sections: Medical AI; Natural Language Processing, Text and Speech Processing; AI in Finance and Cyber Security; Autonomous Vehicles; AI Ethics and Life Sciences.
This edited volume brings together papers by both eminent and rising scholars to celebrate Saul Kripke¿s singular contributions to modal logic. Kripke¿s work on modal logic helped usher in a new semantic epoch for the field and made facility with modal logic indispensable not only to technically oriented philosophers but to theoretical computer scientists and others as well. This volume features previously unpublished work of Kripke¿s as well as a brief intellectual biography recounting the story of how Kripke became interested in, and made his first contributions to, modal logic. However, the majority of the volume¿s contributions are forward-looking, and produce new philosophical and technical insights by engaging with ideas tracing back to Kripke.
This two-volume set, CCIS 2068 and 2069, constitutes selected papers presented during the Second Pan-African Conference on Artificial Intelligence, PanAfriCon AI 2023, held in Addis Ababa, Ethiopia, in October 2023. The set goal of the conference is to exchange the best practices of joint Pan-African efforts to provide solutions for Africa's key 21st century challenges in the social, economic and ecologic domains. The 29 papers were thoroughly reviewed and selected from 134 submissions. The papers are organized in the following topical sections: Medical AI; Natural Language Processing, Text and Speech Processing; AI in Finance and Cyber Security; Autonomous Vehicles; AI Ethics and Life Sciences.
Since its beginning the International Conference on Applied Sciences and Advanced Technology (ICASAT) was planned as a multidisciplinary space and as a platform to explore the frontiers of knowledge in different areas such as Machine Vision, Biotechnology, Computer Sciences, Mechatronics and, Sustainability. Also, a multidisciplinary perspective is required in all aspects of science, engineering, and research, moving towards a more complete overview of recent advances. On its third edition, ICASAT received works focused on the Trends and Challenges for Global Sustainable Development. This book is a collection of the works presented during ICASAT 2023.
Combinatorial Optimization represents a major component of Operations Research, Mathematical Programming, and, in a broader sense, the development of digital intelligence (and society). It covers, in particular, such important areas as network design, location, routing, and scheduling, with major applications in transportation, logistics, health systems, production, communications, and energy.Starting from the exceptional contribution Professor Bernard Gendron made to combinatorial optimization and its applications in multiple areas, the book presents a state-of-the-art view on the field through a combination of surveys, expository articles, and focused methodological and applied research. The authors hail from various Operations Research areas and institutions around the world. Having collaborated closely with Professor Gendron, they drew on his foundational work to showcase a variety of models and algorithms that draw a living picture of the multifaceted word of applied combinatorial optimization.
This text gives a comprehensive, largely self-contained treatment of multivariate heavy tail analysis. Emphasizing regular variation of measures means theory can be presented systematically and without regard to dimension. Tools are developed that allow a flexible definition of "extreme" in higher dimensions and permit different heavy tails to coexist on the same state space leading to "hidden regular variation" and "steroidal regular variation". This emphasizes when estimating risks, it is important to choose the appropriate heavy tail. Theoretical foundations lead naturally to statistical techniques; examples are drawn from risk estimation, finance, climatology and network analysis. Treatments target a broad audience in insurance, finance, data analysis, network science and probability modeling. The prerequisites are modest knowledge of analysis and familiarity with the definition of a measure; regular variation of functions is reviewed but is not a focal point.
This textbook introduces readers to international law by linking it to the Harry Potter universe. Given the current changes in the international sphere away from a state-centric system to a multitude of non-state actors, it tests the legal regime by applying it to the out-of-the-box concept of wizards and thus rids the doctrinal debate of political factors. More specifically, the book explains core concepts of public international law, covering the elements of a state, state responsibility, jurisdiction, enforcement of international law and immunity. In the wizarding world, it addresses questions of statehood by discussing when a wizarding state is responsible for the crimes committed by its wizards, who has jurisdiction over crimes, and how international law is enforced. In addition, it introduces and explains the fundamentals of international humanitarian law, international human rights law, international criminal law, and air law by applying them to the wizarding world. The textbook is intended for anyone looking for an accessible introduction to public international law and its application.
Since the last edition of this book (2014), progress has been astonishing in all areas of Natural Language Processing, with recent achievements in Text Generation that spurred a media interest going beyond the traditional academic circles. Text Processing has meanwhile become a mainstream industrial tool that is used, to various extents, by countless companies. As such, a revision of this book was deemed necessary to catch up with the recent breakthroughs, and the author discusses models and architectures that have been instrumental in the recent progress of Natural Language Processing.As in the first two editions, the intention is to expose the reader to the theories used in Natural Language Processing, and to programming examples that are essential for a deep understanding of the concepts. Although present in the previous two editions, Machine Learning is now even more pregnant, having replaced many of the earlier techniques to process text. Many new techniques build on the availability of text. Using Python notebooks, the reader will be able to load small corpora, format text, apply the models through executing pieces of code, gradually discover the theoretical parts by possibly modifying the code or the parameters, and traverse theories and concrete problems through a constant interaction between the user and the machine. The data sizes and hardware requirements are kept to a reasonable minimum so that a user can see instantly, or at least quickly, the results of most experiments on most machines.The book does not assume a deep knowledge of Python, and an introduction to this language aimed at Text Processing is given in Ch. 2, which will enable the reader to touch all the programming concepts, including NumPy arrays and PyTorch tensors as fundamental structures to represent and process numerical data in Python, or Keras for training Neural Networks to classify texts. Covering topics like Word Segmentation and Part-of-Speech and Sequence Annotation, the textbook also gives an in-depth overview of Transformers (for instance, BERT), Self-Attention and Sequence-to-Sequence Architectures.
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11-13, 2023. The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections: Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis.Part II: security design, short papers.
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11-13, 2023.The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections: Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis.Part II: security design, short papers.
Human digital twin (HDT) is a transformative technology poised to transform various human-centric systems. With its potential applications in personalized healthcare, HDT promises swift, precise, and efficient healthcare services through the integration of cutting-edge technologies such as artificial intelligence, data analytics, internet of things, cybersecurity as well as virtual and augmented reality. This book addresses the critical gap in the existing literature by offering a comprehensive exploration of connectivity solutions for HDT while prioritizing reliability, security, and privacy. Key topics covered include the foundational concept of HDT, its design requirements and associated challenges, edge-assisted human-to-virtual solutions, blockchain-enabled data-sharing mechanisms, and differentially private federated multi-task learning (DPFML) methodologies tailored for HDT.The discussion on the concept of HDT encompasses an overview of its applications and its specific characteristics when compared to the conventional digital twin models. In addressing the design requirements and challenges of HDT, the text delves into the complexities of securing high-quality data, ensuring ultra-reliable and low-latency communication, data privacy and integrity, while managing storage, computation and analytics. Exploring edge-assisted human-to-virtual solutions, the book also introduces a connectivity framework and details the modeling process for human-to-virtual twin connectivity. The book later presents an in-depth examination of the practical Byzantine fault tolerance framework, followed by a discussion on shard-based Byzantine fault-tolerant schemes tailored for HDT, along with analyses of latency and throughput.Furthermore, the book outlines the framework for DPFML-assisted human-to-virtual twin connectivity, accompanied by a novel consensus algorithm known as the proof of model quality. Finally, it presents future research directions aimed at addressing communication challenges hindering the seamless design and development of HDT. By offering this comprehensive exploration, the book serves as a valuable resource for researchers, practitioners, and policymakers seeking to navigate the evolving landscape of HDT and its transformative potential in various domains.
This proceedings constitutes the refereed post-conference proceedings of the 15th International Conference on Simulation Tools and Techniques, SIMUTools 2023, held in Seville, Spain, in December 2023. The 23 revised full papers were carefully selected from 58 submissions. The papers focus on various areas such as Simulation Tools and Methods; Artificial Intelligence and Simulation; Transportation and Logistics; Medical Sciences; and Network Simulations.
The authors Matteo Collodel and Eric Oberheim take the reader on a journey through the early life of the famous Austrian philosopher Paul Feyerabend, whose groundbreaking work Against the Method forged new paths in the philosophical understanding of science. Collodel and Oberheim's book contains the translated correspondence of Feyerabend (1924-1994) with equally influential philosophers and scientists of the time, including Rudolf Carnap, Herbert Feigl, Carl G. Hempel, J.J.C. Smart, David Bohm, and Thomas Kuhn. This book offers an entirely unique approach to the philosopher Paul Feyerabend. Informative, challenging and profound, it immerses the reader deeply in the mind of a truly revolutionary philosopher of science.The main focus lies on the explanation of Paul Feyerabend's ideas on logical empiricism and quantum mechanics, which he developed especially in the 1960s. In order to appreciate the celebrated work of the philosopher, it is important to create an understanding of these formative years in Feyerabend's life and work.Anyone who knows similar discussions, like the paradigm shift of Thomas Kuhn, or has a passion for history, philosophy and science will be fascinated by the works of Paul Feyerabend. As scientists and followers of Feyerabend, Collodel and Oberheim strive to pay respect to the philosopher and to make his work accessible to a whole new generation.
This brief provides a comprehensive overview of nanocarriers used for nanoencapsulation of bioactive compounds. It includes the basis of encapsulation mechanism, encapsulation efficiency, controlled release, target delivery, and its application in food, nutraceuticals, pharmaceuticals and cosmeceuticals.
The outbreak of the COVID-19 pandemic presented Polish legislators with a host of legal dilemmas, the aftermath of which resulted in numerous legislative changes. A significant part of these relate to entrepreneurial law in a broad sense. However, the situation created by the COVID-19 pandemic also had a broader dimension, resulting in the introduction of exceptions as the global norm. Similarly, in the domestic legal order, the actions of public authorities in various forms (restrictions, limitations, and ultimately the Lockdown), as well as non-legislative legal activity gave rise to many problems in Poland and have been the subject of various assessments. Hence, the book analyses the legal situation of entrepreneurs in the era of the COVID-19 pandemic both in terms of the amendments and changes introduced and the new regulations, commonly referred to in the public sphere as "covid laws" or "anti-covid shields". Therefore, the book assesses the legal solutions and the level of legislative technique in the broadly understood entrepreneurial law. It focuses on the solutions introduced by Polish legislators and seeks to answer the following questions: to what extent did the relevant public authorities appropriately respond to the threats posed by the pandemic, and did they effectively provide legal protection for entrepreneurs?
Relying upon extensive global and multidisciplinary research, this book analyzes the perils of market-driven scenarios and peeps into the possibilities responsible for the failure of traditional approaches. It helps in identifying the goals and approaches amenable to sustainable development reflecting upon an ecologically and inclusively sustainable global future. It enriches knowledge base of all research scholars and professionals as well as paves the way for bravely facing the challenges to the sustainability. The book also sheds light on the current and future trends in the domain of sustainability in terms of scenarios, strategies to be adopted, anticipated transitions in climate, and evolution and adoption of best sustainable practices for the common good.Academicians and researchers and professionals from across universities, research, governmental, and private organizations have made their invaluable contributions. The perspectives contributed are drawn from Central and South America, sub-Saharan Africa, and South and Southeast Asia. They cover a spectrum of topics, covering the philosophy underlying sustainable development, organizations, ethics, belief systems, cultures, use of resources, energy, models, cost-benefit analysis, international trade, financial aid, forestry, wildlife, land rights, fisheries, and more. Irrespective of the reader's interest on sustainable development, this book embodies meaningful and productive intent and content. The chapters present well-known topics but with different perspectives, suggesting ways to enhance the present practices and proposing new avenues in furthering the work. The book is intended to cover a wide range of audiences, catering to the needs of a diverse readership. The value of this book is quantified in terms of new concepts and terminology it generates and works as a reference source.
As new threats emerge, the use of AI technologies to protect the world we live in is topical. This book is divided into three parts: methodological fundamentals of AI, use of AI for critical infrastructure protection, and anomaly detection. The first part describes the latest knowledge about creating safe AIs and using them to enhance protection. The following parts present various domains and examples of AI-driven security. The chapters describe potential methods, demonstrate use cases and discuss the challenges of the evolving field. This includes topics such as defensive use of AI to detect threats, discussion about the offensive use of AI to better understand the future threat landscape, the use of AI for automation in critical infrastructure and overall challenges of AI usage for critical tasks. The chapters cover domains such as small enterprises, logistics, smart grid, software security and mobile networks. Understanding latest advancements in this field should be useful to those who want to comprehend modern cybersecurity in detail, and especially to experts in the field, who want to follow research and latest trends. To this effect, this book brings together a group of international researchers and professionals who present their views on how to create security through AI.
This book provides a complete introduction to Artificial Intelligence, covering foundational computational technologies, mathematical principles, philosophical considerations, and engineering disciplines essential for understanding AI. Artificial Intelligence: Principles and Practice emphasizes the interdisciplinary nature of AI, integrating insights from psychology, mathematics, neuroscience, and more. The book addresses limitations, ethical issues, and the future promise of AI, emphasizing the importance of ethical considerations in integrating AI into modern society. With a modular design, it offers flexibility for instructors and students to focus on specific components of AI, while also providing a holistic view of the field. Taking a comprehensive but concise perspective on the major elements of the field; from historical background to design practices, ethical issues and more, Artificial Intelligence: Principles and Practice provides the foundations needed for undergraduate or graduate-level courses. The important design paradigms and approaches to AI are explained in a clear, easy-to-understand manner so that readers will be able to master the algorithms, processes, and methods described. The principal intellectual and ethical foundations for creating artificially intelligent artifacts are presented in Parts I and VIII. Part I offers the philosophical, mathematical, and engineering basis for our current AI practice. Part VIII presents ethical concerns for the development and use of AI. Part VIII also discusses fundamental limiting factors in the development of AI technology as well as hints at AI's promising future. We recommended that PART I be used to introduce the AI discipline and that Part VIII be discussed after the AI practice materials. Parts II through VII present the three main paradigms of current AI practice: the symbol-based, the neural network or connectionist, and the probabilistic. Generous use of examples throughout helps illustrate the concepts, and separate end-of-chapter exercises are included. Teaching resources include a solutions manual for the exercises, PowerPoint presentation, and implementations for the algorithms in the book.
This book constitutes the refereed post proceedings of the 17th Italian Workshop on Artificial Life and Evolutionary Computation, WIVACE 2023, held in Venice, Italy, during September 6-8, 2023.The 30 full papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: Algorithms for complex systems, Biologically inspired models, Complex chemical systems, Adaptation and swarms, Learning, Medicine and Social systems.
Among the technologies that significantly change the modern world of human existence, it is worth mentioning, first of all, digital technologies. These technologies are actively and relentlessly implemented and integrated into all spheres of human activity and society, becoming a powerful catalyst and a determining source of social development. According to such a scenario of development, society acquires the features of digital, thus defining digital technologies as its leading technology. This process is called the digital transformation of society. The wide use of digital technologies to provide free access to information and knowledge is a basic principle of the digital society. Digital society significantly changes traditional ideas about work, education, culture, communication, social and political life. The development of citizens' digital culture is the main condition for the successful construction of a digital society. Therefore, it is important to carry out scientific research and targeted training to improve the qualifications of specialists in various branches of the economy, in particular, educators and scientists to acquire digital competence. After all, these specialists are key figures in ensuring the process of digitalization of education and science. The book presents various aspects of the digital transformation of education and science. A comprehensive view of the current state and prospects of the use of digital technologies for education and science is provided. The experience of using digital technologies and tools for training and improving the qualifications of specialists of various specialties, as well as for the preparation of future PhDs, is described. The book is addressed to education workers, managers, scientists, graduate students, librarians, and all those who are interested in the process of digital transformation of education and science.
The main subject is the probabilistic extreme value theory. The purpose is to present recent results related to limiting distributions of maxima in incomplete samples from stationary sequences, and results related to extremal properties of different combinatorial configurations. The necessary contents related to regularly varying functions and basic results of extreme value theory are included in the first two chapters with examples, exercises and supplements. The motivation for consideration maxima in incomplete samples arises from the fact that real data are often incomplete. A sequence of observed random variables from a stationary sequence is also stationary only in very special cases. Hence, the results provided in the third chapter are also related to non-stationary sequences. The proof of theorems related to joint limiting distribution of maxima in complete and incomplete samples requires a non-trivial combination of combinatorics and point process theory. Chapter four provides results on the asymptotic behavior of the extremal characteristics of random permutations, the coupon collector's problem, the polynomial scheme, random trees and random forests, random partitions of finite sets, and the geometric properties of samples of random vectors. The topics presented here provide insight into the natural connections between probability theory and algebra, combinatorics, graph theory and combinatorial geometry. The contents of the book may be useful for graduate students and researchers who are interested in probabilistic extreme value theory and its applications.
This book examines disruptive mood dysregulation disorder (DMDD) during childhood and adolescence. It explores the ways in which explosive anger outbursts and persistent irritability are among the most problematic symptoms in child and adolescent mental health. and may present as a feature of many different psychiatric illnesses. The volume addresses the myriad challenges that youth with a focus on the DMDD diagnosis experience. Chapters focus on key issues of development, behavior, achievement, social relations, and mood. The book describes how to diagnose and conduct clinical assessments of child and adolescent personality and behavior with suspected DMDD.Key areas of coverage include: Comprehensive history of mood dysregulation research and current trends in psychiatric classification (e.g., DSM-5, Research Domain Criteria) and their influence on the clinical assessment of children and adolescents with suspected DMDD.Updates of professional standards to guide clinicians and diagnosticians and discussions of practical considerations in planning and conducting clinical assessments for children with DMDD.Reviews the most recent editions of questionnaires and tests used in the clinical assessment of child and adolescents with suspected DMDD.Differential diagnosis and practical methods for integrating assessment information to develop an effective, multidisciplinary treatment plan.Review of current trends in psychiatric and psychological treatment of DMDD. Clinician Guide to Disruptive Mood Dysregulation Disorder in Children serves as an essential resource for researchers, professors, and graduate students as well as veteran and early-career clinicians and professionals across such interrelated disciplines as school, clinical child, developmental, and educational psychology, child and adolescent psychiatry, school counseling, social work, and public health.
This book presents the latest synthetic protocols for the assembly of functionalized Cp ligands and their transition metal complexes. Cyclopentadienyl (Cp) complexes of transition metals belong to the most important classes of transition metal complexes with tightly bound ligands in the coordination sphere since their discovery in the middle of the last century. Even though they have been known for a long time, this field constantly evolves to deliver novel modified Cp ligands and complexes and to blossom into new fields of application. Beside the synthesis of ligands and metal complexes this book concentrates on novel and prospering fields of their application in organic synthesis. In this respect the Cp complexes have been applied to induce and catalyze various significant chemical transformations such as new C-C bond formation involving unsaturated substrates (e.g. cyclotrimerizations, cycloadditions, carbometallations, etc.), C-H bond and C-C bond activations followed by subsequent reactions (e.g. arylation, alkenylations, annulations, etc.), as well as many other processes. This volume also covers the recent development and application of chiral Cp complexes in enantioselective synthesis.
Details in depth the current novel and future directions of diagnosis, treatment, and analysis of medical problems that relate to virology Provides examples of the practical applications of novel procedures and approachesIncluded are vanguard topics such as the use of Evidence-Based Medicine, Artificial Intelligence, Neural Networks, Fractals
Traditional products are becoming smart products, and smart products are becoming connected. From smart homes to smart cities to smart farms, this trend in product design and development is likely to accelerate and will have a profound impact on the future.This accessible textbook/reference focuses on using the Internet of Things (IoT) to foster sustainability. It guides readers in a step-by-step manner through the creation of example applications designed to promote a clean and healthy environment. Additionally, the book serves as a lesson in systems design, taking the view that the IoT is best understood as an extension of the World Wide Web. Therefore, the exposition examines how the Web was designed and how its principles can be applied to IoT design.The book engages readers with modern IoT technologies, standards, and platforms. It connects sensors and actuators to the cloud, but in a way that is based on sound architectural principles.Topics and features: - Combines principles of computer science with hands-on exercises and programming- Includes the Particle Photon 2 microcontroller, and uses Node.js and Node-RED- Covers cryptocurrencies, machine learning, and identification technologies- Examines sensing and actuation using The Photon 2 and MQTT- Leverages large language models in exercises The IoT has countless applications, making this textbook/reference appealing to a wide variety of readers. In particular, those pursuing or interested in computer science, internet technologies, product design, city planning, sensor networks, or software design will find the book intriguing and useful. Dr. Barry Burd is a Professor at Drew University. Mr. Michael McCarthy is an Associate Teaching Professor at Carnegie Mellon University, and Mr. Ian Pollock is an Associate Professor at California State University, East Bay.
This book proposes a novel connectionist approach to a challenging topic of language modeling within the context of kernel memory and artificial mind system, both proposed previously by the author in the very first volume of the series, Artificial Mind System--Kernel Memory Approach: Studies in Computational Intelligence, Vol. 1. The present volume focuses on how syntactic structures of language are modeled in terms of the respective composite connectionist architectures, each embracing both the nonsymbolic and symbolic parts. These two parts are developed via inter-module processes within the artificial mind system and eventually integrated under a unified framework of kernel memory. The data representation by the networks embodied within the kernel memory principle is essentially local, unlike conventional artificial neural network models such as the pervasive multilayer perceptron-based neural networks. With this locality principle, kernel memory inherently bears many attractive features, such as topologically unconstrained network formation, straightforward network growing, shrinking, and reconfiguration, no requirement of arduous iterative parameter tuning, construction of transparent and hierarchical data structures, and multimodal and temporal data processing via the network representation. Exploiting these multifacet properties of kernel memory with interweaving the notion of inter-module processing within the artificial mind system provides coherent accounts for concept formation and how various linguistic phenomena, viz. word compoundings, morphologies, and multiword constructions, are modeled. The description is then extended to more intricate network models of context-dependent lexical network and syntactic-oriented processing, the latter being the central theme of the present study, and further to those representing a hybrid of nonverbal and verbal thinking, and semantic and pragmatic aspects of sentential meaning. The book is intended for general readers engaging in various areas of study in cognitive science, computer science, engineering, linguistics, philosophy, psycholinguistics, and psychology.
This book provides readers with an introductory overview of art from the perspective of science, technology, engineering, and mathematics. The author utilizes well-known and important works of art to demonstrate how STEM concepts apply to them. The book's examples include a structural analysis of Michelangelo's David. The author covers major breakthroughs in art history, such as the discovery of perspective. The book also discusses other important elements of art, such as color, from a scientific point of view. The author ensures that readers will understand the art terms used by comparing them with terms used in STEM fields of study.
This book thoroughly examines the design of full-duplex medium access control (MAC) protocols in wireless networks. It is organized into three main sections: (a) Fundamentals and preliminaries of full-duplex communications, (b) A comprehensive review of the existing full-duplex MAC protocols, and (c) Designs of full-duplex MAC protocols in three typical wireless networks, i.e., wireless local access networks (WLANs), multi-hop networks and millimeter-wave networks. Also, the authors extensively address key challenges in these three wireless full-duplex networks, such as the hidden-node problem, accumulative interference, and deafness and blockage problems. Solutions to these challenges are meticulously devised to enhance the overall network performance.The wireless full-duplex communication technique, facilitating simultaneous transmission and reception within the same frequency band, holds immense potential for enhancing spectrum efficiency and network capacity. It emerges as a pivotal technology in the sixth-generation (6G) networks. This book provides a comprehensive review and in-depth exploration of full-duplex MAC design across various networks, encompassing WLANs, multi-hop networks, and millimeter-wave networks. Acknowledging the challenges faced by full-duplex WLANs, particularly the hidden-node problem, it also introduces a pioneering hidden-node-free design and a MAC protocol design, which features a full-duplex enhanced carrier-sensing mechanism. Addressing the need to augment end-to-end throughput in multi-hop networks employing full-duplex relaying, the authors present an analytical model for end-to-end throughput and propose a multi-hop full-duplex MAC protocol designed to optimize network performance. Furthermore, the exploration extends to full-duplex millimeter-wave networks, delving into issues of deafness and blockage. A directional full-duplex MAC protocol is introduced to enhance network capacity and mitigate blockage problems. This book concludes by outlining prospective research directions within the related fields of study and offers valuable insights for future exploration.This book targets researchers and advanced level students in computer science and electrical engineering. It also caters to professionals engaged in the fields of wireless networks, full-duplex system, protocol design, and network optimization will also buy this book.
The book tries to answer the most fundamental question of whether there is a link between abundant food supply and economic growth with respect to a higher degree of human development. In order to have flourishing economic growth within a country the need for a food security system is a must. The world as we know is faced with shortages of food supply which has been a major factor in the country's economic development. The book is an attempt to understand the problems and current situation of food systems in the developing world. It focuses on the pathways to understand the challenges that it faces and predict future scenarios. The motive is to create academic literature to understand the basis of sustainable food security. The social, economic, and political factors become the main theme of the book. It focuses on the interdisciplinary nature of food security. Many a time we only understand the idea of food security through the lens of scientific nature but in the meantime, it forgets the other important factors that are governing the issue of food security. The inclusion of the cases section in the book helps to outline the current scenarios of the developing world. It helps to formulate a pathway or a way forward to understand the causes of food security. Food has now become a political context in the international system. The need for analyzing the political angle is necessary. The context of innovations and technological developments forms an important part of food security. The critique of existing policy systems across the developing world is a must need discussion as it is the policies that will make the food systems sustainable. Last but not least is to look at how the global food systems work and how far it has been able to fix the problems of food insecurity in the developing world. Overall, the book is an excellent interdisciplinary food security literature.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.