You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
The representation of abstract data and ideas can be a difficult and tedious task to handle when learning new concepts; however, the advances of emerging technology have allowed for new methods of representing such conceptual data. The Handbook of Research on Maximizing Cognitive Learning through Knowledge Visualization focuses on the use of visualization technologies to assist in the process of better comprehending scientific concepts, data, and applications. Highlighting the utilization of visual power and the roles of sensory perceptions, computer graphics, animation, and digital storytelling, this book is an essential reference source for instructors, engineers, programmers, and software developers interested in the exchange of information through the visual depiction of data.
The COVID-19 pandemic has likely changed the mathematics, health and environmental education research landscape in profound and long-lasting ways. As such, more than ever, there is a need to creatively and critically think about how we design research and for what purposes. This necessitates a considered and robust discussion about educational research theory, method, and methodology to ensure that our research continues to impact practice in valuable ways. This book maps out some of these key challenges and opportunities as we collectively enter a post-COVID-19 world in which method and methodology need to be appreciated as much as research findings. Topics explored here range from big-picture issues in STEM Education research, through perspectives on design-based research, to questions of analysis, complexity, the Delphi method, and ethical dilemmas.
How Chinese Teach Mathematics and Improve Teaching builds upon existing studies to examine mathematics classroom instruction in China. It combines contributions from Chinese scholars with commentary from key Western scholars to offer a truly systematic examination of some important and distinctive features of mathematics classroom instruction. Viewing classroom instruction as part of teachers' instructional practices, this book goes beyond teachers' in-classroom instructional practice by also examining Chinese teachers' approaches and practices in developing and improving teaching. Through this unique approach, How Chinese Teach Mathematics and Improve Teaching expands and unpacks the otherwise fragmented knowledge about Chinese practices in developing and carrying out mathematics classroom instruction.
Advanced Porous Biomaterials for Drug Delivery Applications probes cutting-edge progress in the application of advanced porous biomaterials in drug delivery fields. These biomaterials offer promise in improving upon the design, cost, and creation of potent novel drug delivery systems. The book focuses on two categories: nature engineered and synthetic advanced porous biomaterials, with a wide range of low-cost porous biomaterial-based systems that have been used for the delivery of diverse drugs through in vitro/in vivo approaches. Details how advanced porous biomaterial-assisted systems improve essential properties in drug delivery applications Explains how advanced porous biomaterials syst...
This book discusses the recent advances in natural computation, fuzzy systems and knowledge discovery. Presenting selected, peer-reviewed papers from the 15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2019), held in Kunming, China, from 20 to 22 July 2019, it is a useful resource for researchers, including professors and graduate students, as well as R&D staff in industry.
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a wide variety of related topics. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.
The mushrooming of illegal housing on the periphery of cities is one of the main consequences of rapid urbanisation associated with social and environmental problems in the developing countries. Sustainable Urbanism in Developing Countries discusses the linkage between urbanism and sustainability and how sustainable urbanism can be implemented to overcome the problems of housing and living conditions in urban areas. Through case studies from India, Indonesia, China, etc., using advanced GIS techniques, this book analyses several planning and design criteria to solve the physical, social, and economic problems of urbanisation and refers to urban planning as an effective measure to protect and...
This book provides a comprehensive study of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT related to security and privacy. • Covers all aspects of security • Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions • Discusses ways for achieving better access control and trust in the IoT ecosystem • Contributes exhaustive strategic plans to deal with security issues of IoT • Gathers contributions from leading-edge researchers from academia and industry Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. Th...
We live in challenging and uncertain times, with profound implications for the purpose and nature of education. The crises of the Anthropocene, with the related climate-related challenges, biodiversity loss, a global pandemic, and changes to the world of work driven by science and technology innovation and the ascendency of data and knowledge, pressure us to rethink how we prepare people for such futures. This, in turn, has changed the landscape of educational research, perhaps particularly in the areas of mathematics, health and environmental education research that are so central to responding to these global pressures and potential solutions. We need to think critically about education re...