|
|
Books > Computing & IT
Capturing, recording and broadcasting the voice is often difficult.
Many factors must be taken into account and achieving a true
representation is much more complex than one might think. The
capture devices such as the position of the singer(s) or
narrator(s), the acoustics, atmosphere and equipment are just some
of the physical aspects that need to be mastered. Then there is the
passage through the analog or digital channel, which disrupts the
audio signal, as well as the processes that are often required to
enrich, improve or even transform the vocal timbre and tessitura.
While in the past these processes were purely material, today
digital technologies and software produce surprising results that
every professional in recording and broadcasting should know how to
master. Recording and Voice Processing 1 addresses some general
theoretical concepts. A history of recording and the physiology of
the vocal apparatus are detailed in order to give the reader an
understanding of the fundamental aspects of the subject. This
volume also includes an advanced study of microphones, addressing
their characteristics and typologies. The acoustic environment and
its treatment are also considered in terms of the location of the
sound capture - whether in a home studio, recording studio, live or
natural environment - in order to achieve a satisfactory sound
recording.
Originating from papers presented at the 18th International
Conference on Railway Engineering Design and Operation, this book
provides up-to-date research on the use of advanced systems,
promoting their general awareness throughout the management,
design, manufacture and operation of railways and other emerging
passenger, freight and transit systems. A key emphasis is placed on
the use of computer systems in advanced railway engineering. The
included works are compiled from a variety of specialists
interested in the development of railways, including managers,
consultants, railway engineers, designers of advanced train control
systems and computer specialists. Topics covered include: Traffic
safety, security and monitoring; Train and railways analysis;
Operation of rail networks; Advanced train control;
Energy-efficient design; Traffic modelling and simulation.
The Beginnings of Electron Microscopy - Part 2, Volume 221 in the
Advances in Imaging and Electron Physics series, highlights new
advances in the field, with this new volume presenting interesting
chapters on Recollections from the Early Years: Canada-USA, My
Recollection of the Early History of Our Work on Electron Optics
and the Electron Microscope, Walter Hoppe (1917-1986),
Reminiscences of the Development of Electron Optics and Electron
Microscope Instrumentation in Japan, Early Electron Microscopy in
The Netherlands, L. L. Marton, 1901-1979, The Invention of the
Electron Fresnel Interference Biprism, The Development of the
Scanning Electron Microscope, and much more.
This book is not deep research work, as I am not a Ph.D. professor at
any international university.
I was a teacher. I was also a real estate investor. And now I am a
fulltime writer. Nevertheless, I am also research addicted reading two
books per month.
Moreover, as I studied Macroeconomics, I found out that the world has
been threatened by a new virus, the decentralized digital virus.
Metaverse, Decentraland, blockchain, bitcoin standard, smart contracts,
protocols, nodes, tokens, and halvings suddenly invaded my eyes with
such a power that I had to understand what the hell was that about. If
you do not know what these concepts are, you are in the right place.
Some of these articles are controversial, others you might agree with,
but most of them try to explain how the world is shifting into a fully
digital mode.
Central banks and governments are trying to keep the boat afloat in a
perfect MMT style, while politicians still do not quite understand how
the moneyprinting machine works. They keep saying we need raise taxes
to pay the debt when the government is the only issuer, so it cannot
become insolvent.
With deflationary pressure from technological innovations, the need for
fresh money puts central banks in the red to control inflation.
Covid-19 hit hard on every economy, but only the issuers can control
the orchestra. Straightforwardly, as a non-native writer, I will try to
give you a perspective about how the world is changing, from analog to
digital, from the real world to the metaverse, with a fascinating
silent war between centralized money printing power and decentralized
fully digital crypto ecosystems.
Cyber security is a key focus in the modern world as more private
information is stored and saved online. In order to ensure vital
information is protected from various cyber threats, it is
essential to develop a thorough understanding of technologies that
can address cyber security challenges. Artificial intelligence has
been recognized as an important technology that can be employed
successfully in the cyber security sector. Due to this, further
study on the potential uses of artificial intelligence is required.
The Handbook of Research on Cyber Security Intelligence and
Analytics discusses critical artificial intelligence technologies
that are utilized in cyber security and considers various cyber
security issues and their optimal solutions supported by artificial
intelligence. Covering a range of topics such as malware, smart
grid, data breachers, and machine learning, this major reference
work is ideal for security analysts, cyber security specialists,
data analysts, security professionals, computer scientists,
government officials, researchers, scholars, academicians,
practitioners, instructors, and students.
There has been a multitude of studies focused on the COVID-19
pandemic across fields and disciplines as all sectors of life have
had to adjust the way things are done and adapt to the constantly
shifting environment. These studies are crucial as they provide
support and perspectives on how things are changing and what needs
to be done to stay afloat. Connecting COVID-19-related studies and
big data analytics is crucial for the advancement of industrial
applications and research areas. Applied Big Data Analytics and Its
Role in COVID-19 Research introduces the most recent industrial
applications and research topics on COVID-19 with big data
analytics. Featuring coverage on a broad range of big data
technologies such as data gathering, artificial intelligence, smart
diagnostics, and mining mobility, this publication provides
concrete examples and cases of usage of data-driven projects in
COVID-19 research. This reference work is a vital resource for data
scientists, technical managers, researchers, scholars,
practitioners, academicians, instructors, and students.
Including the latest Microsoft 365 features and enhanced support
for Mac users, Cengage's Technology for Success and Illustrated
Series® Collection, Microsoft® 365® & Office® 2021, 1st
edition, helps you quickly master the nuances of Microsoft®
Office. Its concise, student-friendly approach uses a proven
two-page layout that allows you to work through an entire task
without turning the page. Each module begins with a brief overview
of the principles covered while large, full-color screen images
illustrate what you see on your computer. Module Learning
Objectives are mapped to Microsoft Office Specialist (MOS)
certification objectives, and module scenarios are based on Burning
Glass market insights data -- helping you sharpen the critical
skills you need for real-world success. In addition, MindTap and
SAM (Skills Assessment Manager) online resources help maximize your
study time -- and results.
Machine Learning for Planetary Science presents planetary
scientists with a way to introduce machine learning into the
research workflow as increasingly large nonlinear datasets are
acquired from planetary exploration missions. The book explores
research that leverages machine learning methods to enhance our
scientific understanding of planetary data and serves as a guide
for selecting the right methods and tools for solving a variety of
everyday problems in planetary science using machine learning.
Illustrating ways to employ machine learning in practice with case
studies, the book is clearly organized into four parts to provide
thorough context and easy navigation. The book covers a range of
issues, from data analysis on the ground to data analysis onboard a
spacecraft, and from prioritization of novel or interesting
observations to enhanced missions planning. This book is therefore
a key resource for planetary scientists working in data analysis,
missions planning, and scientific observation.
In this book, I am going to show you everything you need to know:
1. Exactly how to set up your own portfolio of dividend stocks
2. Where to open up a brokerage account
3. How to never pay a commission when you buy or sell a stock
4. Which dividend stocks are the safest
5. Which dividend stocks to avoid (don't start investing until you read
this)
6. How to super-charge your returns
7. How to profit from a bear market
And much, much more...
Build a solid foundation in data analysis skills and pursue a
coveted Data+ certification with this intuitive study guide CompTIA
Data+ Study Guide: Exam DA0-001 delivers easily accessible and
actionable instruction for achieving data analysis competencies
required for the job and on the CompTIA Data+ certification exam.
You'll learn to collect, analyze, and report on various types of
commonly used data, transforming raw data into usable information
for stakeholders and decision makers. With comprehensive coverage
of data concepts and environments, data mining, data analysis,
visualization, and data governance, quality, and controls, this
Study Guide offers: All the information necessary to succeed on the
exam for a widely accepted, entry-level credential that unlocks
lucrative new data analytics and data science career opportunities
100% coverage of objectives for the NEW CompTIA Data+ exam Access
to the Sybex online learning resources, with review questions,
full-length practice exam, hundreds of electronic flashcards, and a
glossary of key terms Ideal for anyone seeking a new career in data
analysis, to improve their current data science skills, or hoping
to achieve the coveted CompTIA Data+ certification credential,
CompTIA Data+ Study Guide: Exam DA0-001 provides an invaluable head
start to beginning or accelerating a career as an in-demand data
analyst.
Feature Extraction for Image Processing and Computer Vision is an
essential guide to the implementation of image processing and
computer vision techniques, with tutorial introductions and sample
code in MATLAB and Python. Algorithms are presented and fully
explained to enable complete understanding of the methods and
techniques demonstrated. As one reviewer noted, "The main strength
of the proposed book is the link between theory and exemplar code
of the algorithms." Essential background theory is carefully
explained. This text gives students and researchers in image
processing and computer vision a complete introduction to classic
and state-of-the art methods in feature extraction together with
practical guidance on their implementation.
Lean thinking involves more than just eliminating waste; through
its five guiding principles-value, value chain, continuous flow,
pull production, and perfection-its successful applications are
commonly found in the manufacturing sector. Although its
application and benefits to companies is no longer contested, it is
rare to find works that consolidate applications of lean thinking
in sectors that are unconventional, such as healthcare and
government. Cases on Lean Thinking Applications in Unconventional
Systems allows readers to broaden their view on lean thinking
applications and visualize insights for research. It presents case
studies and applications of lean thinking within several different
industries. Covering topics such as emergency care units,
standardized work, and national humanization policy, this case book
is an essential resource for engineers, hospital administrators,
healthcare professionals, IT managers, government officials,
students and faculty of higher education, researchers, and
academicians.
The concept of autonomic computing seeks to reduce the complexity
of pervasively ubiquitous system management and maintenance by
shifting the responsibility for low-level tasks from humans to the
system while allowing humans to concentrate on high-level tasks.
This is achieved by building self-managing systems that are
generally capable of self-configuring, self-healing,
self-optimising, and self-protecting. Trustworthy autonomic
computing technologies are being applied in datacentre and cloud
management, smart cities and autonomous systems including
driverless cars. However, there are still significant challenges to
achieving trustworthiness. This book covers challenges and
solutions in autonomic computing trustworthiness from methods and
techniques to achieve consistent and reliable system
self-management. Researchers, developers and users need to be
confident that an autonomic self-managing system will remain
correct in the face of any possible contexts and environmental
inputs. The book is aimed at researchers in autonomic computing,
autonomics and trustworthy autonomics. This will be a go-to book
for foundational knowledge, proof of concepts and novel trustworthy
autonomic techniques and approaches. It will be useful to lecturers
and students of autonomic computing, autonomics and multi-agent
systems who need an easy-to-use text with sample codes, exercises,
use-case demonstrations. This is also an ideal tutorial guide for
independent study with simple and well documented diagrams to
explain techniques and processes.
Recent years have seen a proliferation of cybersecurity guidance in
the form of government regulations and standards with which
organizations must comply. As society becomes more heavily
dependent on cyberspace, increasing levels of security measures
will need to be established and maintained to protect the
confidentiality, integrity, and availability of information; the
privacy of consumers; and the continuity of economic activity.
Compliance is a measure of the extent to which a current state is
in conformance with a desired state. The desired state is commonly
operationalized through specific business objectives, professional
standards, and regulations. Assurance services provide a means of
evaluating the level of compliance with various cybersecurity
requirements. The proposed book will summarize current
cybersecurity guidance and provide a compendium of innovative and
state-of-the-art compliance and assurance practices and tools that
can function both as a reference and pedagogical source for
practitioners and educators. This publication will provide a
synopsis of current cybersecurity guidance that organizations
should consider in establishing and updating their cybersecurity
systems. Assurance services will also be addressed so that
management and their auditors can regularly evaluate their extent
of compliance. This book should be published because its theme will
provide company management, practitioners, and academics with a
good summary of current guidance and how to conduct assurance of
appropriate compliance.
Handbook of Medical Image Computing and Computer Assisted
Intervention presents important advanced methods and state-of-the
art research in medical image computing and computer assisted
intervention, providing a comprehensive reference on current
technical approaches and solutions, while also offering proven
algorithms for a variety of essential medical imaging applications.
This book is written primarily for university researchers, graduate
students and professional practitioners (assuming an elementary
level of linear algebra, probability and statistics, and signal
processing) working on medical image computing and computer
assisted intervention.
IoT-enabled Unobtrusive Surveillance Systems for Smart Campus
Safety Enables readers to understand a broad area of
state-of-the-art research in physical IoT-enabled security
IoT-enabled Unobtrusive Surveillance Systems for Smart Campus
Safety describes new techniques in unobtrusive surveillance that
enable people to act and communicate freely, while at the same time
protecting them from malevolent behavior. It begins by
characterizing the latest on surveillance systems deployed at smart
campuses, miniatures of smart cities with more demanding frameworks
that enable learning, social interaction, and creativity, and by
performing a comparative assessment in the area of unobtrusive
surveillance systems for smart campuses. A proposed taxonomy for
IoT-enabled smart campus unfolds in five research dimensions: (1)
physical infrastructure; (2) enabling technologies; (3) software
analytics; (4) system security; and (5) research methodology. By
applying this taxonomy and by adopting a weighted scoring model on
the surveyed systems, the book presents the state of the art and
then makes a comparative assessment to classify the systems.
Finally, the book extracts valuable conclusions and inferences from
this classification, providing insights and directions towards
required services offered by unobtrusive surveillance systems for
smart campuses. IoT-enabled Unobtrusive Surveillance Systems for
Smart Campus Safety includes specific discussion of: Smart campus's
prior work taxonomies and classifications, a proposed taxonomy, and
an adopted weight scoring model Personal consumer benefits and
potential social dilemmas encountered when adopting an unobtrusive
surveillance system Systems that focus on smart buildings, public
spaces, smart lighting and smart traffic lights, smart labs, and
smart campus ambient intelligence A case study of a spatiotemporal
authentication unobtrusive surveillance system for smart campus
safety and emerging issues for further research directions
IoT-enabled Unobtrusive Surveillance Systems for Smart Campus
Safety is an essential resource for computer science and
engineering academics, professionals, and every individual who is
working and doing research in the area of unobtrusive surveillance
systems and physical security to face malevolent behavior in smart
campuses.
|
|