Listing 1 - 10 of 137 | << page >> |
Sort by
|
Choose an application
This book provides an introduction to symplectic field theory, a new and important subject which is currently being developed. The starting point of this theory are compactness results for holomorphic curves established in the last decade. The author presents a systematic introduction providing a lot of background material, much of which is scattered throughout the literature. Since the content grew out of lectures given by the author, the main aim is to provide an entry point into symplectic field theory for non-specialists and for graduate students. Extensions of certain compactness results, which are believed to be true by the specialists but have not yet been published in the literature in detail, top off the scope of this monograph.
Differential geometry. Global analysis --- Differential topology --- Mathematics --- differentiaal geometrie --- wiskunde --- geometrie --- topologie
Choose an application
This book investigates the forgotten years of Kurdish nationalism in Iran, from the fall of the Kurdish republic to the advent of the Iranian revolution. An original and path-breaking investigation of the period, it sheds light not only on the historical specificity of the phenomenon of nationalism in exile, but also on the political processes and practices defining the development of Kurdish nationalism in the post-revolutionary era. Although nationalist landmarks such as the Kurdish republic in 1946 and the resurgence of the movement in the revolutionary conjuncture of 1978-79 have attracted the attention of historians and social scientists in recent years, little is known about the three decades of Kurdish nationalism in exile between these two events. This analysis draws on contemporary poststructuralist theory to question the concept of the minority in democratic and constitutional theory, arguing that it is an effect of the discursive linkage between sovereign power and the dominant ethnic-linguistic identity in the nation-state. This text will appeal to a wide academic audience ranging from the fields of Kurdish, Iranian and Middle East Studies to ethnicity, nationalism, power, and modern social and political theory. Abbas Vali is former Chair of Modern Social and Political Thought at the Department of Sociology, Bogazici University, Turkey.
Religious studies --- Politics --- Economics --- Polemology --- religie --- politiek --- wereldpolitiek --- vrede --- Middle East
Choose an application
This book constitutes the proceedings of the Second International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2020, held as part of the 22nd International Conference, HCI International 2020, which took place in Copenhagen, Denmark, in July 2020. The total of 1439 papers and 238 posters included in the 37 HCII 2020 proceedings volumes was carefully reviewed and selected from 6326 submissions. HCI-CPT 2020 includes a total of 45 regular papers; they were organized in topical sections named: human factors in cybersecurity; privacy and trust; usable security approaches. As a result of the Danish Government's announcement, dated April21, 2020, to ban all large events (above 500 participants) until September 1, 2020, the HCII 2020 conference was held virtually. .
Ergodic theory. Information theory --- Mathematical control systems --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- informatica --- computerbeveiliging --- computernetwerken --- informatietheorie --- interfaces --- netwerk management
Choose an application
This book provides a comprehensive reference for everything that has to do with digital circuits. The author focuses equally on all levels of abstraction. He tells a bottom-up story from the physics level to the finished product level. The aim is to provide a full account of the experience of designing, fabricating, understanding, and testing a microchip. The content is structured to be very accessible and self-contained, allowing readers with diverse backgrounds to read as much or as little of the book as needed. Beyond a basic foundation of mathematics and physics, the book makes no assumptions about prior knowledge. This allows someone new to the field to read the book from the beginning. It also means that someone using the book as a reference will be able to answer their questions without referring to any external sources.
Electronics --- Electrical engineering --- microprocessoren --- elektronica --- micro-elektronica --- elektrische circuits
Choose an application
Choose an application
This book provides a visual overview of how to master ultrasonography and ultrasound biomicroscopy techniques. Updated ultrasonic information is included in a simple brief way, featuring didactic points, with a variety of documented scans and illustrated lines underneath for more clarification. Each pathology is accompanied with several scans of different findings to give more information of distinct detections. Ophthalmic Ultrasonography and Ultrasound Biomicroscopy: A Clinical Guide examines many clinical complexities with possible solutions when performing and interpreting ultrasound while also breaking down information for easier intake. The clinical cases are from a specialist eye hospital where many complicated cases are treated, giving a unique insight for the reader to understand treatment for a variety of cases. The book also emphasises the importance of everyday cases with further explanation whilst utilising a diversity of pictures and labels.
Choose an application
This book constitutes the refereed proceedings of the Third International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2021, held as part of the 23rd International Conference, HCI International 2021, which took place virtually in July 2021. The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. HCI-CPT 2021 includes a total of 30 papers; they were organized in topical sections named: usable security; security and privacy by design; user behavior analysis in cybersecurity; and security and privacy awareness.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheid (technologie) --- cryptografie --- applicatiebeheer --- apps --- informatica --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- mobiele communicatie --- interfaces
Choose an application
This book focuses on the idea of Academic Persian in the growing competition of many Middle Eastern languages to produce and highlight their academic discourse. Similar to academic English, most West Asian languages including Persian, Turkish, and Arabic are developing new styles and genres to produce academic texts. The book addresses a major question: "What is academic Persian?" Intended for researchers, experts, analysts, policy-makers, and students in Persian, Iranian studies, and Islamic studies, as well as Near Eastern languages and Middle Eastern cultures and languages, the book includes numerous technical contributions on the emerging markets involving west Asian languages. Since indexing, abstracting, crawling, metrics, citations, and visibility are becoming hot issues for academics, service providers (e.g., publishers) and policy-makers (e.g., university heads), a knowledge of academic Persian will help readers to grasp what Persian, and other similar languages, require in academic markets.
Sociology of education --- Didactics of languages --- Educational sciences --- Linguistics --- onderwijspolitiek --- onderwijs --- talenonderwijs --- linguïstiek
Choose an application
This book presents recent advances in NLP and speech technology, a topic attracting increasing interest in a variety of fields through its myriad applications, such as the demand for speech guided touchless technology during the Covid-19 pandemic. The authors present results of recent experimental research that provides contributions and solutions to different issues related to speech technology and speech in industry. Technologies include natural language processing, automatic speech recognition (for under-resourced dialects) and speech synthesis that are useful for applications such as intelligent virtual assistants, among others. Applications cover areas such as sentiment analysis and opinion mining, Arabic named entity recognition, and language modelling. This book is relevant for anyone interested in the latest in language and speech technology.
Electronics --- Engineering sciences. Technology --- Computer architecture. Operating systems --- Computer. Automation --- Mathematical linguistics --- digitale signaalverwerking --- NLP (neurolinguïstisch programmeren) --- spraaktechnologie --- signal processing --- signaalprocessoren --- signaalverwerking
Choose an application
This book uses digital radios as a challenging design example, generalized to bridge a typical gap between designers who work on algorithms and those who work to implement those algorithms on silicon. The author shows how such a complex system can be moved from high-level characterization to a form that is ready for hardware implementation. Along the way, readers learn a lot about how algorithm designers can benefit from knowing the hardware they target and how hardware designers can benefit from a familiarity with the algorithm. The book shows how a high-level description of an algorithm can be migrated to a fixed-point block diagram with a well-defined cycle accurate architecture and a fully documented controller. This can significantly reduce the length of the hardware design cycle and can improve its outcomes. Ultimately, the book presents an explicit design flow that bridges the gap between algorithm design and hardware design. Provides a guide to baseband radio design for Wi-Fi and cellular systems, from an implementation-focused, perspective Explains how arithmetic is moved to hardware and what the cost of each operation is in terms of delay, area and power Enables strategic architectural decisions based on the algorithm, available processing units and design requirements.
Listing 1 - 10 of 137 | << page >> |
Sort by
|