You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Cyber Security Solutions for Protecting and Building the Future Smart Grid guides the reader from the fundamentals of grid security to practical techniques necessary for grid defense. Through its triple structure, readers can expect pragmatic, detailed recommendations on the design of solutions and real-world problems. The book begins with a supportive grounding in the security needs and challenges of renewable-integrated modern grids. Next, industry professionals provide a wide range of case studies and examples for practical implementation. Finally, cutting-edge researchers and industry practitioners guide readers through regulatory requirements and develop a clear framework for identifyin...
Parenting and educating a child with an autism spectrum disorder (ASD) is a unique experience for many reasons. Too often, the K-12 school system overlooks the needs of children with ASDs or educators find themselves unprepared to provide a learning environment that fulfills these needs. Parents of children with ASDs must also stay informed on autism support services, school system practices, developmental pediatrics, and more in order to be an active voice in how their children are supported within the school system. Understanding Parent Experiences and Supporting Autistic Children in the K-12 School System shares the experiences of children with ASDs in order to develop more supportive practices for these children as they navigate the K-12 system. It also offers best practices, strategies, and information for educators to provide a sufficient learning environment to support children with ASDs within their classrooms. Covering topics such as assistive tools, inclusive practices, and parent experiences, it is an ideal resource for K-12 administration and faculty, educators, pre-service teachers, policymakers, parents, researchers, and academicians.
In the new world order, conflicts between countries are increasing. Fluctuations in the economy and imbalances in the distribution of scarce resources to developing countries can result in wars. The effect of the recent COVID-19 pandemic and economic crisis has caused changes in the strategies and policies of countries. Technological changes and developments have also triggered cyber wars. Despite this, many countries prefer to fight on the field. The damage to the international economy of wars, which kills civilians and causes serious damage to developing countries, is a current issue. The Handbook of Research on War Policies, Strategies, and Cyber Wars examines the factors that lead to war and the damages caused by war strategies and policies. It is a guide for future generations to develop constructive policies and strategies for living in a peaceful world. Covering topics such as geopolitical consequences, civil liberty, and terrorism, this major reference work is a dynamic resource for policymakers, strategists, government officials, politicians, sociologists, students and educators of higher education, librarians, researchers, and academicians.
This book constitutes the first of 3 volumes of refereed conference proceedings of the 8th International Conference on Intelligent Computing, ICIC 2012, held in Huangshan, China, in July 2012. The 242 revised full papers presented were carefully reviewed and selected from 753 submissions. The 84 papers included in this volume are organized in topical sections on evolutionary learning and genetic algorithms, fuzzy theory and models, swarm intelligence and optimization, kernel methods and supporting vector machines, nature inspired computing and optimization, systems biology and computational biology, knowledge discovery and data mining, graph theory and algorithms, machine learning theory and...
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Intelligent Computing, ICIC 2011, held in Zhengzhou, China, in August 2011. The 94 revised full papers presented were carefully reviewed and selected from 832 submissions. The papers are organized in topical sections on intelligent computing in scheduling; local feature descriptors for image processing and recognition; combinatorial and numerical optimization; machine learning theory and methods; intelligent control and automation; knowledge representation/reasoning and expert systems; intelligent computing in pattern recognition; intelligent computing in image processing; intelligent computing in computer vision; biometrics with applications to individual security/forensic sciences; modeling, theory, and applications of positive systems; sparse manifold learning methods and applications; advances in intelligent information processing.
As global criminology evolves, new questions arise. How can policymakers and law enforcement agencies leverage criminological insights to formulate effective crime prevention strategies? How do international collaborations in forensic science contribute to a more robust global criminal justice framework? Cases on Forensic and Criminological Science for Criminal Detection and Avoidance beckons readers into the fascinating world of forensic science and criminology. Distinguished authors span multi-level experience as practitioners, researchers, and academics, and they examine the multifaceted dimensions of criminal detection and avoidance. Contributors, hailing from globally recognized institu...
The exchange of data is the most significant feature of cyber-physical systems (CPS). There are definite advantages and limitations of CPS that must be considered in order to be utilized appropriately across various fields and disciplines. Cyber-Physical Systems and Supporting Technologies for Industrial Automation discusses the latest trends of cyber-physical systems in healthcare, manufacturing processes, energy, and the mobility industry. The book also focuses on advanced subsystems required for the communication of real-time data. Covering key topics such as supporting technologies, Industry 4.0, and manufacturing, this premier reference source is ideal for computer scientists, engineers, industry professionals, researchers, academicians, scholars, practitioners, instructors, and students.
During the COVID-19 era, the functions of social policy and public administration have undergone a meaningful change, especially with the advancement of digital elements and online and virtual functions. Cyber developments, cyber threats, and the effects of cyberwar on the public administrations of countries have become critical research subjects, and it is important to have resources that can introduce and guide users through the current best practices, laboratory methods, policies, protocols, and more within cyber public administration and social policy. The Handbook of Research on Cyber Approaches to Public Administration and Social Policy focuses on the post-pandemic changes in the functions of social policy and public administration. It also examines the implications of the cyber cosmos on public and social policies and practices from a broad perspective. Covering topics such as intersectional racism, cloud computing applications, and public policies, this major reference work is an essential resource for scientists, laboratory technicians, professionals, technologists, computer scientists, policymakers, students, educators, researchers, and academicians.
The book covers a wide range of wireless communication and network technologies, and will help readers understand the role of wireless technologies in applications touching on various spheres of human life, e.g. healthcare, agriculture, building smart cities, forecasting and the manufacturing industry. The book begins by discussing advances in wireless communication, including emerging trends and research directions for network technologies. It also highlights the importance of and need to actively develop these technologies. In turn, the book addresses different algorithms and methodologies which could be beneficial in implementing 5G Mobile Communication, Vehicular Ad-hoc Networks (VANET), Reliable Cooperative Networks, Delay Tolerant Networks (DTN) and many more contexts related to advanced communications. It then addresses the prominence of wireless communication in connection with the Internet of Things (IoT), Mobile Opportunistic Networks and Cognitive Radio Networks (CRN). Lastly, it presents the new horizons in architecture and building protocols for Li-Fi (Light-Fidelity) and Wearable Sensor Technology.
This book constitutes the refereed proceedings of the 8th International Conference on Intelligent Computing, ICIC 2012, held in Huangshan, China, in July 2012. The 85 revised full papers presented were carefully reviewed and selected from 753 submissions. The papers are organized in topical sections on neural networks, evolutionar learning and genetic algorithms, granular computing and rough sets, biology inspired computing and optimization, nature inspired computing and optimization, cognitive science and computational neuroscience, knowledge discovery and data mining, quantum computing, machine learning theory and methods, healthcare informatics theory and methods, biomedical informatics theory and methods, complex systems theory and methods, intelligent computing in signal processing, intelligent computing in image processing, intelligent computing in robotics, intelligent computing in computer vision, intelligent agent and web applications, special session on advances in information security 2012.