|
|
Books > Computing & IT
Cell phone apps share location information; software companies
store user data in the cloud; biometric scanners read fingerprints;
employees of some businesses have microchips implanted in their
hands. In each of these instances we trade a share of privacy or an
aspect of identity for greater convenience or improved security.
What Robert M. Pallitto asks in Bargaining with the Machine is
whether we are truly making such bargains freely - whether, in
fact, such a transaction can be conducted freely or advisedly in
our ever more technologically sophisticated world. Pallitto uses
the social theory of bargaining to look at the daily compromises we
make with technology. Specifically, he explores whether resisting
these 'bargains' is still possible when the technologies in
question are backed by persuasive, even coercive, corporate and
state power. Who, he asks, is proposing the bargain? What is the
balance of bargaining power? What is surrendered and what is
gained? And are the perceived and the actual gains and losses the
same - that is, what is hidden? At the center of Pallitto's work is
the paradox of bargaining in a world of limited agency. Assurances
that we are in control are abundant whether we are consumers,
voters, or party to the social contract. But when purchasing goods
from a technological behemoth like Amazon, or when choosing a
candidate whose image is crafted and shaped by campaign strategists
and media outlets, how truly free, let alone informed, are our
choices? The tension between claims of agency and awareness of its
limits is the site where we experience our social lives - and
nowhere is this tension more pronounced than in the surveillance
society. This book offers a cogent analysis of how that complex,
contested, and even paradoxical experience arises as well as an
unusually clear and troubling view of the consequential compromises
we may be making.
5G NR: The Next Generation Wireless Access Technology, Second
Edition, follows the authors' highly celebrated books on 3G and 4G
and provides a new level of insight into 5G NR. After background
discussion of 5G, including requirements, spectrum aspects, and the
standardization timeline, all technology features of the first
phase of NR are described in detail. The book covers the NR
physical-layer structure and higher-layer protocols, RF and
spectrum aspects, and co-existence and interworking with LTE. The
book provides a good foundation in NR and different NR technology
components, giving insight into why a certain solution has been
selected. This second edition is updated to reflect the latest
developments in Release 16 and includes brand new chapters on: NR
in unlicensed spectrum; NR-U in Rel-16; IAB; V2X and sidelink in
Rel-16; industrial IoT; IIoT and referring to the URLLC
enhancements for PDCCH; RIM/CL; and positioning. Also included are
the key radio-related requirements of NR; design principles;
technical features of basic NR transmission structure-showing where
it was inherited from LTE, where it deviates from it, and the
reasons why- NR multi-antenna transmission functionality; detailed
description of the signals and functionality of the initial NR
access, including signals for synchronization and system
information; random access and paging; LTE/NR co-existence in the
same spectrum and the benefits of their interworking as one system;
and different aspects of mobility in NR. RF requirements for NR are
described for BS and UE, the legacy bands, and for the new mm-wave
bands.
Based on scientific understanding and empirical evidence of how
humans understand and interact with robotic and autonomous systems,
the author reviews the concerns that have been raised around the
deployment of AI and robots in human society, and the potential for
disruption and harm. He explains why transparency ought to be a
fundamental design consideration for Human Computer Interaction
(HCI) and artificial intelligent systems. Starting with a survey of
global research in the field and what transparency means in the
wider context of trust, control and ethics, the author then
introduces a transparent robot control architecture, and the impact
of transparency using real-time displays. He presents a case study
of a muttering robot, and covers current and upcoming standards for
transparency, as well as future perspectives for the design,
manufacture and operation of autonomous robotic systems.
Specifically, chapters cover transparency in the wider context of
trust; a transparent robot control architecture, the impact of
transparency using real-time displays, transparency using audio -
the Muttering Robot, the effects of appearance on transparency,
synthesis and further work, and several examples of Instinct
reactive planner commands. This book provides key insights into
transparency in robots and autonomous systems for industry,
academic researchers and engineers working on intelligent
autonomous system design, human robot interaction, AI, and machine
ethics. It also offers points of interest for professionals
developing governmental or organisational policies and standards
for the design of intelligent autonomous and AI systems, and
government and standard bodies working in the emerging applications
of AI.
The Art of Investigative Interviewing, Fourth Edition, builds on
the successes of the previous editions providing the reader
guidance on conducting investigative interviews, both ethically and
professionally. The book can be used by anyone who is involved in
investigative interviewing. It is a perfect combination of real,
practical, and effective techniques, procedures, and actual cases.
The reader learns key elements of investigative interviewing, such
as human psychology, proper interview preparation, tactical
concepts, controlling the interview environment, and evaluating the
evidence obtained from the interview. New to this edition will be
coverage of Open Source Intelligence (OSINT) tools, workplace
investigations, fraud investigations and the role of audit. Larry
Fennelly joins original author Inge Sebyan Black, both well-known
and respected in the field, providing everything an interviewer
needs to know in order to conduct successful interviews with
integrity and within the law. Written for anyone involved in
investigative interviewing.
The key parameter that needs to be considered when planning the
management of resources in futuristic wireless networks is a
balanced approach to resource distribution. A balanced approach is
necessary to provide an unbiased working environment for the
distribution, sharing, allocation, and supply of resources among
the devices of the wireless network. Equal resource distribution
also maintains balance and stability between the operations of
communication systems and thus improves the performance of wireless
networks. Managing Resources for Futuristic Wireless Networks is a
pivotal reference source that presents research related to the
control and management of key parameters of bandwidth, spectrum
sensing, channel selection, resource sharing, and task scheduling,
which is necessary to ensure the efficient operation of wireless
networks. Featuring topics that include vehicular ad-hoc networks,
resource management, and the internet of things, this publication
is ideal for professionals and researchers working in the field of
networking, information and knowledge management, and communication
sciences. Moreover, the book will provide insights and support
executives concerned with the management of expertise, knowledge,
information, and organizational development in different types of
work communities and environments.
The field of healthcare is seeing a rapid expansion of
technological advancement within current medical practices. The
implementation of technologies including neural networks,
multi-model imaging, genetic algorithms, and soft computing are
assisting in predicting and identifying diseases, diagnosing
cancer, and the examination of cells. Implementing these biomedical
technologies remains a challenge for hospitals worldwide, creating
a need for research on the specific applications of these
computational techniques. Deep Neural Networks for Multimodal
Imaging and Biomedical Applications provides research exploring the
theoretical and practical aspects of emerging data computing
methods and imaging techniques within healthcare and biomedicine.
The publication provides a complete set of information in a single
module starting from developing deep neural networks to predicting
disease by employing multi-modal imaging. Featuring coverage on a
broad range of topics such as prediction models, edge computing,
and quantitative measurements, this book is ideally designed for
researchers, academicians, physicians, IT consultants, medical
software developers, practitioners, policymakers, scholars, and
students seeking current research on biomedical advancements and
developing computational methods in healthcare.
A groundbreaking treatise by one of the great mathematicians of our
age, who outlines a style of thinking by which great ideas are
conceived. What inspires and spurs on a great idea? Can we train
ourselves to think in a way that will enable world-changing
understandings and insights to emerge? Richard Hamming said we can.
He first inspired a generation of engineers, scientists, and
researchers in 1986 with "You and Your Research," an electrifying
sermon on why some scientists do great work, why most don't, why he
did, and why you can-and should-too. The Art of Doing Science and
Engineering is the full expression of what "You and Your Research"
outlined. It's a book about thinking; more specifically, a style of
thinking by which great ideas are conceived. The book is filled
with stories of great people performing mighty deeds-but they are
not meant simply to be admired. Instead, they are to be aspired to,
learned from, and surpassed. Hamming consistently returns to
Shannon's information theory, Einstein's theory of relativity,
Grace Hopper's work on high-level programming, Kaiser's work on
digital fillers, and his own work on error-correcting codes. He
also recounts a number of his spectacular failures as clear
examples of what to avoid. Originally published in 1996 and adapted
from a course that Hamming taught at the US Naval Postgraduate
School, this edition includes an all-new foreword by designer,
engineer, and founder of Dynamicland Bret Victor, plus more than 70
redrawn graphs and charts. The Art of Doing Science and Engineering
is a reminder that a capacity for learning and creativity are
accessible to everyone. Hamming was as much a teacher as a
scientist, and having spent a lifetime forming and confirming a
theory of great people and great ideas, he prepares the next
generation for even greater distinction.
Explore everything you need to know to set up secure remote access,
harden your firewall deployment, and protect against phishing Key
Features Learn the ins and outs of log forwarding and
troubleshooting issues Set up GlobalProtect satellite connections,
configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an
in-depth understanding of user credential detection to prevent data
leaks Book DescriptionThis book builds on the content found in
Mastering Palo Alto Networks, focusing on the different methods of
establishing remote connectivity, automating log actions, and
protecting against phishing attacks through user credential
detection. Complete with step-by-step instructions, practical
examples, and troubleshooting tips, you will gain a solid
understanding of how to configure and deploy Palo Alto Networks
remote access products. As you advance, you will learn how to
design, deploy, and troubleshoot large-scale end-to-end user VPNs.
Later, you will explore new features and discover how to
incorporate them into your environment. By the end of this Palo
Alto Networks book, you will have mastered the skills needed to
design and configure SASE-compliant remote connectivity and prevent
credential theft with credential detection. What you will learn
Understand how log forwarding is configured on the firewall Focus
on effectively enabling remote access Explore alternative ways for
connecting users and remote networks Protect against phishing with
credential detection Understand how to troubleshoot complex issues
confidently Strengthen the security posture of your firewalls Who
this book is forThis book is for anyone who wants to learn more
about remote access for users and remote locations by using
GlobalProtect and Prisma access and by deploying Large Scale VPN.
Basic knowledge of Palo Alto Networks, network protocols, and
network design will be helpful, which is why reading Mastering Palo
Alto Networks is recommended first to help you make the most of
this book.
Digital controllers are part of nearly all modern personal,
industrial, and transportation systems. Every senior or graduate
student of electrical, chemical, or mechanical engineering should
therefore be familiar with the basic theory of digital controllers.
This new text covers the fundamental principles and applications of
digital control engineering, with emphasis on engineering design.
Fadali and Visioli cover analysis and design of digitally
controlled systems and describe applications of digital control in
a wide range of fields. With worked examples and Matlab
applications in every chapter and many end-of-chapter assignments,
this text provides both theory and practice for those coming to
digital control engineering for the first time, whether as a
student or practicing engineer.
Computer vision and machine intelligence paradigms are prominent in
the domain of medical image applications, including computer
assisted diagnosis, image guided radiation therapy, landmark
detection, imaging genomics, and brain connectomics. Medical image
analysis and understanding are daunting tasks owing to the massive
influx of multi-modal medical image data generated during routine
clinal practice. Advanced computer vision and machine intelligence
approaches have been employed in recent years in the field of image
processing and computer vision. However, due to the unstructured
nature of medical imaging data and the volume of data produced
during routine clinical processes, the applicability of these
meta-heuristic algorithms remains to be investigated. Advanced
Machine Vision Paradigms for Medical Image Analysis presents an
overview of how medical imaging data can be analyzed to provide
better diagnosis and treatment of disease. Computer vision
techniques can explore texture, shape, contour and prior knowledge
along with contextual information, from image sequence and 3D/4D
information which helps with better human understanding. Many
powerful tools have been developed through image segmentation,
machine learning, pattern classification, tracking, and
reconstruction to surface much needed quantitative information not
easily available through the analysis of trained human specialists.
The aim of the book is for medical imaging professionals to acquire
and interpret the data, and for computer vision professionals to
learn how to provide enhanced medical information by using computer
vision techniques. The ultimate objective is to benefit patients
without adding to already high healthcare costs.
Cellular Internet of Things: From Massive Deployments to Critical
5G Applications, Second Edition, gives insights into the recent and
rapid work performed by the 3rd Generation Partnership Project
(3GPP) and the Multefire Alliance (MFA) to develop systems for the
Cellular IoT. Beyond the technologies, readers will learn what the
mMTC and cMTC market segments look like, deployment options and
expected performance in terms of system capacity, expected battery
lifetime, data throughput, access delay time and device cost,
regulations for operation in unlicensed frequency bands, and how
they impact system design and performance. This new edition
contains updated content on the latest EC-GSM IoT, LTE-M and NB-IoT
features in 3GPP Release 15, critical communication, i.e. URLLC,
specified in 3GPP Release 15 for both LTE and NR, LTE-M and NB-IoT
for unlicensed frequency bands specified in the Multefire Alliance
(MFA), and an updated outlook of what the future holds in
Industrial IoT and drone communications, amongst other topics.
Cultural tourism, domestic and international, is comprised of
travel that takes people out of their usual environments and
focuses on activities that are related to the cultural aspects of
an area. Rapid progress in technology, especially the advancement
of mobile applications, has changed various aspects of travel,
especially in areas such as transportation. Cultural Tourism in the
Wake of Web Innovation: Emerging Research and Opportunities is an
essential scholarly book that examines revolutionary changes taking
place in the field of cultural tourism that are a result of the
applications of web-based and other information technologies
including Web 2.0 innovations, locational technologies, and digital
imaging. It features a wide range of topics such as economic
development, mobile applications, and green development, and is
intended for use by hotel management, travel agents, event
organizers and planners, airline managers, academicians,
researchers, students, and professionals in the tourism and
hospitality industry.
The internet of things (IoT) has emerged as a trending technology
that is continually being implemented into various practices within
the field of engineering and science due to its versatility and
various benefits. Despite the levels of innovation that IoT
provides, researchers continue to search for networks that maintain
levels of sustainability and require fewer resources. A network
that measures up to these expectations is Narrowband IoT (NBIoT),
which is a low power wide area version of IoT networks and is
suitable for larger projects. Engineers and other industry
professionals are in need of in-depth knowledge on this growing
technology and its various applications. Principles and
Applications of Narrowband Internet of Things (NBIoT) is an
essential reference source that provides an in-depth understanding
on the recent advancements of NBIoT as well as the crucial roles of
emerging low power IoT networks in various regions of the world.
Featuring research on topics such as security monitoring,
sustainability, and cloud infrastructure, this book is ideally
designed for developers, engineers, practitioners, researchers,
students, managers, and policymakers seeking coverage on the
large-scale deployment and modern applications of NBIoT.
Computational Retinal Image Analysis: Tools, Applications and
Perspectives gives an overview of contemporary retinal image
analysis (RIA) in the context of healthcare informatics and
artificial intelligence. Specifically, it provides a history of the
field, the clinical motivation for RIA, technical foundations
(image acquisition modalities, instruments), computational
techniques for essential operations, lesion detection (e.g. optic
disc in glaucoma, microaneurysms in diabetes) and validation, as
well as insights into current investigations drawing from
artificial intelligence and big data. This comprehensive reference
is ideal for researchers and graduate students in retinal image
analysis, computational ophthalmology, artificial intelligence,
biomedical engineering, health informatics, and more.
Dielectric Metamaterials: Fundamentals, Designs, and Applications
links fundamental Mie scattering theory with the latest dielectric
metamaterial research, providing a valuable reference for new and
experienced researchers in the field. The book begins with a
historical, evolving overview of Mie scattering theory. Next, the
authors describe how to apply Mie theory to analytically solve the
scattering of electromagnetic waves by subwavelength particles.
Later chapters focus on Mie resonator-based metamaterials, starting
with microwaves where particles are much smaller than the free
space wavelengths. In addition, several chapters focus on
wave-front engineering using dielectric metasurfaces and the
nonlinear optical effects, spontaneous emission manipulation,
active devices, and 3D effective media using dielectric
metamaterials.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,228
Discovery Miles 12 280
|