You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
On March 27, 1977, 583 people died when KLM and Pan Am 747s collided on a crowded, foggy runway in Tenerife, the Canary Islands. The cause, a miscommunication between the pilot and the air traffic controller. The pilot radioed, "We are now at takeoff," meaning that the plane was lifting off, but the tower controller misunderstood and thought the plane was waiting on the runway. In Fatal Words, Steven Cushing explains how miscommunication has led to dozens of aircraft disasters, and he proposes innovative solutions for preventing them. He examines ambiguities in language when aviation jargon and colloquial English are mixed, when a word is used that has different meanings, and when different words are used that sound alike. To remedy these problems, Cushing proposes a visual communication system and a computerized voice mechanism to help clear up confusing language. Fatal Words is an accessible explanation of some of the most notorious aircraft tragedies of our time, and it will appeal to scholars in communications, linguistics, and cognitive science, to aviation experts, and to general readers.
The 11thInternational Conference on Cyber Warfare and Security (ICCWS 2016) is being held at Boston University, Boston, USA on the 17-18th March 2016. The Conference Chair is Dr Tanya Zlateva and the Programme Chair is Professor Virginia Greiman, both from Boston University. ICCWS is a recognised Cyber Security event on the International research conferences calendar and provides a valuable platform for individuals to present their research findings, display their work in progress and discuss conceptual and empirical advances in the area of Cyber Warfare and Cyber Security. It provides an important opportunity for researchers and managers to come together with peers to share their experience...
This book constitutes the refereed post-conference proceedings of the 19th International Conference on Computer Science and Education in Computer Science, CSECS 2023, held in June 2023 in Boston, MA, USA. The 23 full papers and 9 short papers were carefully reviewed and selected from 88 submissions. The papers cover many systems technologies, applications, and services as well as solutions. Multiple topics have been addressed including the theory of computation, models of computation, computational complexity and cryptography, logic, design, and analysis of algorithms, network architectures, performance evaluation, network services, software engineering, software creation, and management, applied computing, machine learning, and education.
Challenge-based research focuses on addressing societal and environmental problems. One way of doing so is by transforming existing businesses to profitable ventures through co-creation and co-evolution. Drawing on the resource-based view, this book discusses how social challenges can be linked with the industrial value-chain through collaborative research, knowledge sharing, and transfer of technology to deliver value. The work is divided into three sections: Part 1 discusses social challenges, triple bottom line, and entrepreneurship as drivers for research, learning, and innovation while Part 2 links challenge-based research to social and industrial development in emerging markets. The fi...
The Red Hotel series takes readers on a thrilling journey through a world teetering on the edge of chaos. From tracking down the mastermind behind a devastating bomb attack in Tokyo to unraveling a calculated act of war by a powerful global superpower, Dan Reilly becomes the linchpin in preventing larger catastrophes and maintaining the fragile geopolitical order, all while racing against time to stop Russian President Nicolai Gorshkov's dangerous ambitions and avert a global crisis. Written by Ed Fuller and Gary Grossman, authors who are no strangers to real world intrigue and international crises, the Red Hotel series combines geopolitical suspense, espionage, and thrilling action. As Reilly battles formidable adversaries and races against the clock, the line between fiction and reality blurs, delivering a gripping narrative ripped from today's headlines. For the first time, RED Hotel, RED Deception, and RED Chaos are in one ebook!
This book follows the methodologies of complex adaptive systems research in their application to addressing the problems of terrorism, specifically terrorist networks, their structure and various methods of mapping and interdicting them as well as exploring the complex landscape of network-centric and irregular warfare. A variety of new models and approaches are presented here, including Dynamic Network Analysis, DIME/PMESII models, percolation models and emergent models of insurgency. In addition, the analysis is informed by practical experience, with analytical and policy guidance from authors who have served within the U.S. Department of Defense, the British Ministry of Defence as well as those who have served in a civilian capacity as advisors on terrorism and counter-terrorism.
Best Practices for Administering Online Programs is a practical volume for university teams seeking to manage effective online programs. Defining, designing, implementing, and updating online courses is a highly collaborative effort, particularly with limited resources and expanding student enrollment. This book unites the efforts of program directors, supervisors, department chairs, participating faculty, instructional designers, IT specialists, and support staff toward a common goal: affordable, accessible, and scalable online learning. Readers will find guidelines for fostering quality, faculty skills, academic integrity, learning objectives, course improvement, and more.
These proceedings represent the work of researchers participating in the 13th International Conference on Cyber Warfare and Security (ICCWS 2018) which is being hosted this year by the National Defense University in Washington DC, USA on 8-9 March 2018.