Narrow your search
Listing 1 - 6 of 6
Sort by

Book
Computational Methods for Medical and Cyber Security
Authors: ---
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.


Book
Computational Methods for Medical and Cyber Security
Authors: ---
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.


Book
Computational Methods for Medical and Cyber Security
Authors: ---
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.

Keywords

fintech --- financial technology --- blockchain --- deep learning --- regtech --- environment --- social sciences --- machine learning --- learning analytics --- student field forecasting --- imbalanced datasets --- explainable machine learning --- intelligent tutoring system --- adversarial machine learning --- transfer learning --- cognitive bias --- stock market --- behavioural finance --- investor’s profile --- Teheran Stock Exchange --- unsupervised learning --- clustering --- big data frameworks --- fault tolerance --- stream processing systems --- distributed frameworks --- Spark --- Hadoop --- Storm --- Samza --- Flink --- comparative analysis --- a survey --- data science --- educational data mining --- supervised learning --- secondary education --- academic performance --- text-to-SQL --- natural language processing --- database --- machine translation --- medical image segmentation --- convolutional neural networks --- SE block --- U-net --- DeepLabV3plus --- cyber-security --- medical services --- cyber-attacks --- data communication --- distributed ledger --- identity management --- RAFT --- HL7 --- electronic health record --- Hyperledger Composer --- cybersecurity --- password security --- browser security --- social media --- ANOVA --- SPSS --- internet of things --- cloud computing --- computational models --- metaheuristics --- phishing detection --- website phishing --- fintech --- financial technology --- blockchain --- deep learning --- regtech --- environment --- social sciences --- machine learning --- learning analytics --- student field forecasting --- imbalanced datasets --- explainable machine learning --- intelligent tutoring system --- adversarial machine learning --- transfer learning --- cognitive bias --- stock market --- behavioural finance --- investor’s profile --- Teheran Stock Exchange --- unsupervised learning --- clustering --- big data frameworks --- fault tolerance --- stream processing systems --- distributed frameworks --- Spark --- Hadoop --- Storm --- Samza --- Flink --- comparative analysis --- a survey --- data science --- educational data mining --- supervised learning --- secondary education --- academic performance --- text-to-SQL --- natural language processing --- database --- machine translation --- medical image segmentation --- convolutional neural networks --- SE block --- U-net --- DeepLabV3plus --- cyber-security --- medical services --- cyber-attacks --- data communication --- distributed ledger --- identity management --- RAFT --- HL7 --- electronic health record --- Hyperledger Composer --- cybersecurity --- password security --- browser security --- social media --- ANOVA --- SPSS --- internet of things --- cloud computing --- computational models --- metaheuristics --- phishing detection --- website phishing


Book
"You are not expected to understand this" : how 26 lines of code changed the world
Authors: --- ---
ISBN: 9780691230818 0691230811 9780691208480 0691208484 Year: 2022 Publisher: Princeton, N.J. Princeton University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Everything from law enforcement to space exploration relies on code written by people who, at the time, made choices and assumptions that would have long-lasting, profound implications for society. Torie Bosch brings together many of today’s leading technology experts to provide new perspectives on the code that shapes our lives. Contributors discuss a host of topics, such as how university databases were programmed long ago to accept only two genders, what the person who programmed the very first pop-up ad was thinking at the time, the first computer worm, the Bitcoin white paper, and perhaps the most famous seven words in Unix history: “You are not expected to understand this.” This compelling book tells the human stories behind programming, enabling those of us who don’t think much about code to recognize its importance, and those who work with it every day to better understand the long-term effects of the decisions they make. With an introduction by Ellen Ullman and contributions by Mahsa Alimardani, Elena Botella, Meredith Broussard, David Cassel, Arthur Daemmrich, Charles Duan, Quinn DuPont, Claire L. Evans, Hany Farid, James Grimmelmann, Katie Hafner, Susan C. Herring, Syeda Gulshan Ferdous Jana, Lowen Liu, John MacCormick, Brian McCullough, Charlton McIlwain, Lily Hay Newman, Margaret O’Mara, Will Oremus, Nick Partridge, Benjamin Pope, Joy Lisi Rankin, Afsaneh Rigot, Ellen R. Stofan, Lee Vinsel, Josephine Wolff, and Ethan Zuckerman." -- Publisher's description.

Keywords

Computer programming --- Computer science --- COMPUTERS / Programming / General. --- Social aspects --- ARPANET. --- Addition. --- Advertising. --- Adviser. --- Amplitude. --- Analogy. --- Association for Computing Machinery. --- Attendance. --- Binary number. --- Black people. --- COBOL. --- Capability. --- Censorship. --- Certificate authority. --- Charles Babbage. --- Collaboration. --- Communication. --- Computation. --- Computer Fraud and Abuse Act. --- Computer. --- Computing. --- Consideration. --- Conspiracy theory. --- Data processing system. --- Debug (command). --- Detection. --- Digital Equipment Corporation. --- Edsger W. Dijkstra. --- Ellen Ullman. --- Email. --- Espionage. --- Fake news. --- Flight controller. --- Fortran. --- Fragility. --- GLIMPSE. --- Gravity well. --- Hidden Figures. --- Hyperlink. --- Identifier. --- Imagination. --- Infrasound. --- Ingenuity. --- Instrumentation. --- Intermediary. --- JPEG. --- Jacquard loom. --- Kapton. --- Katie Hafner. --- Larry Page. --- Law enforcement. --- Low-budget film. --- Magnetic field. --- Malware. --- Mathematician. --- Michael Mandiberg. --- Molecule. --- Morris worm. --- Nickname. --- Operating system. --- Orbital eccentricity. --- PDP-1. --- PL/I. --- Password. --- Perforated paper. --- Personalization. --- Pixel. --- Plumbing. --- Pollution. --- Pop-up ad. --- Popularity. --- Prediction. --- Process control. --- Profanity. --- Programmer. --- Programming language. --- Publication. --- Ray Tomlinson. --- Risk assessment. --- Screenshot. --- Server (computing). --- Shortage. --- Sobriquet. --- Software. --- Source lines of code. --- Spacecraft. --- Spacewar (video game). --- Spamming. --- Surveillance. --- System administrator. --- TX-0. --- Technology. --- Telegraphy. --- Teleprinter. --- The Misunderstanding. --- Thought. --- Unemployment. --- Unix. --- Verb. --- Vulnerability (computing). --- Informatics --- Science --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Programming --- Sociology of knowledge --- COMPUTERS / Programming / General --- SOCIAL SCIENCE / Technology Studies


Book
The only woman in the room : Golda Meir and her path to power
Author:
ISBN: 0691239312 Year: 2022 Publisher: Princeton, New Jersey ; Oxford : Princeton University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A feminist biography of the only woman to become prime minister of IsraelIn this authoritative and empathetic biography, Pnina Lahav reexamines the life of Golda Meir (1898–1978) through a feminist lens, focusing on her recurring role as a woman standing alone among men. The Only Woman in the Room is the first book to contend with Meir’s full identity as a woman, Jew, Zionist leader, and one of the founders of Israel, providing a richer portrait of her persona and legacy.Meir, Lahav shows, deftly deflected misogyny as she traveled the path to becoming Israel’s fourth, and only female, prime minister, from 1969 to 1974. Lahav revisits the youthful encounters that forged Meir’s passion for socialist Zionism and reassesses her decision to separate from her husband and leave her children in the care of others. Enduring humiliation and derision from her colleagues, Meir nevertheless led in establishing Israel as a welfare state where social security, workers’ rights, and maternity leave became law. Lahav looks at the challenges that beset Meir’s premiership, particularly the disastrous Yom Kippur War, which led to her resignation and withdrawal from politics, as well as Meir’s bitter duel with feminist and civil rights leader Shulamit Aloni, Meir’s complex relationship with the Israeli and American feminist movements, and the politics that led her to distance herself from feminism altogether.Exploring the tensions between Meir’s personal and political identities, The Only Woman in the Room provides a groundbreaking new account of Meir’s life while also illuminating the difficulties all women face as they try to ascend in male-dominated fields.

Keywords

Women prime ministers --- Meir, Golda, --- A Room of One's Own. --- Activism. --- All rights reserved. --- Amendment. --- Aunt. --- Bourgeoisie. --- Buddhism. --- Cess. --- Clare Boothe Luce. --- Comrade. --- Dafna. --- Davar. --- Deliberation. --- Disability. --- Disadvantage. --- Dissident. --- Double burden. --- Emptiness. --- Ethel Kennedy. --- Femininity. --- Feminism (international relations). --- Feminism. --- Feminist philosophy. --- Feminist theory. --- First Lady. --- Flightless bird. --- Furniture. --- Gender equality. --- Gender neutrality. --- Gender role. --- Glass ceiling. --- Golda Meir. --- Groupthink. --- Halakha. --- Hanging. --- Henrietta Szold. --- Histadrut. --- Hostility. --- Humiliation. --- In Her Skin. --- Inferiority complex. --- Institution. --- Isolationism. --- Israel State Archives. --- Israelis. --- Jews. --- John Foster Dulles. --- Kibbutz. --- Knesset. --- Ladies' Home Journal. --- Lawlessness. --- Letty Cottin Pogrebin. --- Loneliness. --- Majority rule. --- Majority. --- Manicure. --- Mapai. --- Memoir. --- Misogyny. --- Mother. --- Mrs. --- Ms. --- Multitude. --- Oriana Fallaci. --- Pale of Settlement. --- Password. --- Pat Nixon. --- Persephone. --- Privacy. --- Proportionality (mathematics). --- Rachel Katznelson-Shazar. --- Reason. --- Resentment. --- Ridicule. --- Ritual. --- Ruth Bader Ginsburg. --- Secrecy (book). --- Secrecy. --- Secularism. --- Sewing. --- Sexism. --- Shimon Peres. --- Socialist feminism. --- Squat toilet. --- Subconscious. --- Suffragette. --- Superiority (short story). --- Sympathy. --- Tel Aviv. --- The Bathtub. --- The Feminine Mystique. --- Tibetan Buddhism. --- Uncertainty. --- Upper class. --- Virginity. --- Weapon. --- Wet nurse. --- Women in Israel. --- Yiddish. --- Zionism.


Book
Integral Transforms and Operational Calculus
Author:
ISBN: 3039216198 303921618X Year: 2019 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Researches and investigations involving the theory and applications of integral transforms and operational calculus are remarkably wide-spread in many diverse areas of the mathematical, physical, chemical, engineering and statistical sciences.

Keywords

infinite-point boundary conditions --- nonlinear boundary value problems --- q-polynomials --- ?-generalized Hurwitz–Lerch zeta functions --- Hadamard product --- password --- summation formulas --- Hankel determinant --- multi-strip --- Euler numbers and polynomials --- natural transform --- fuzzy volterra integro-differential equations --- zeros --- fuzzy differential equations --- Szász operator --- q)-Bleimann–Butzer–Hahn operators --- distortion theorems --- analytic function --- generating relations --- differential operator --- pseudo-Chebyshev polynomials --- Chebyshev polynomials --- Mellin transform --- uniformly convex functions --- operational methods --- differential equation --- ?-convex function --- Fourier transform --- q)-analogue of tangent zeta function --- q -Hermite–Genocchi polynomials --- Dunkl analogue --- derivative properties --- q)-Euler numbers and polynomials of higher order --- exact solutions --- encryption --- spectrum symmetry --- advanced and deviated arguments --- PBKDF --- wavelet transform of generalized functions --- fuzzy general linear method --- Lommel functions --- highly oscillatory Bessel kernel --- generalized mittag-leffler function --- audio features --- the uniqueness of the solution --- analytic --- Mittag–Leffler functions --- Dziok–Srivastava operator --- Bell numbers --- rate of approximation --- Bessel kernel --- univalent functions --- inclusion relationships --- Liouville–Caputo-type fractional derivative --- tangent polynomials --- Bernoulli spiral --- multi-point --- q -Hermite–Euler polynomials --- analytic functions --- Fredholm integral equation --- orthogonality property --- Struve functions --- cryptography --- Janowski star-like function --- starlike and q-starlike functions --- piecewise Hermite collocation method --- uniformly starlike and convex functions --- q -Hermite–Bernoulli polynomials --- generalized functions --- meromorphic function --- basic hypergeometric functions --- fractional-order differential equations --- q -Sheffer–Appell polynomials --- integral representations --- Srivastava–Tomovski generalization of Mittag–Leffler function --- Caputo fractional derivative --- Bernoulli --- symmetric --- sufficient conditions --- nonlocal --- the existence of a solution --- functions of bounded boundary and bounded radius rotations --- differential inclusion --- symmetry of the zero --- recurrence relation --- nonlinear boundary value problem --- Volterra integral equations --- Ulam stability --- q)-analogue of tangent numbers and polynomials --- starlike function --- function spaces and their duals --- strongly starlike functions --- q)-Bernstein operators --- vibrating string equation --- ?-generalized Hurwitz-Lerch zeta functions --- bound on derivatives --- Janowski convex function --- volterra integral equation --- strongly-starlike function --- Hadamard product (convolution) --- regular solution --- generalized Hukuhara differentiability --- functions with positive real part --- exponential function --- q–Bleimann–Butzer–Hahn operators --- Carlitz-type q-tangent polynomials --- distributions --- Carlitz-type q-tangent numbers --- starlike functions --- Riemann-Stieltjes functional integral --- hash --- K-functional --- (p --- Euler --- truncated-exponential polynomials --- Maple graphs --- Hurwitz-Euler eta function --- higher order Schwarzian derivatives --- generating functions --- strongly convex functions --- Hölder condition --- multiple Hurwitz-Euler eta function --- recurrence relations --- q-starlike functions --- partial sum --- Euler and Genocchi polynomials --- tangent numbers --- spectral decomposition --- determinant definition --- monomiality principle --- highly oscillatory --- Hurwitz-Lerch zeta function --- Adomian decomposition method --- analytic number theory --- existence --- existence of at least one solution --- symmetric identities --- modulus of continuity --- modified Kudryashov method --- MFCC --- q-hypergeometric functions --- differential subordination --- Janowski functions --- and Genocchi numbers --- series representation --- initial conditions --- generalization of exponential function --- upper bound --- q-derivative (or q-difference) operator --- DCT --- Schwartz testing function space --- anuran calls --- generalized Kuramoto–Sivashinsky equation --- Mittag–Leffler function --- subordination --- Hardy space --- convergence --- Hermite interpolation --- direct Hermite collocation method --- q-Euler numbers and polynomials --- distribution space --- Apostol-type polynomials and Apostol-type numbers --- Schauder fixed point theorem --- fractional integral --- convolution quadrature rule --- q)-integers --- Liouville-Caputo fractional derivative --- fixed point --- convex functions --- Grandi curves --- tempered distributions --- higher order q-Euler numbers and polynomials --- radius estimate

Listing 1 - 6 of 6
Sort by