The Most Noble of People presents a nuanced look at questions of identity in Muslim Spain under the Umayyads, an Arab dynasty that ruled from 756 to 1031. With a social historical emphasis on relations among different religious and ethnic groups, and between men and women, Jessica A. Coope considers the ways in which personal and cultural identity in al-Andalus could be alternately fluid and co…
Anomaly Detection & Behavior Prediction: Higher-Level Fusion Based on Computational Neuroscientific Principles
Over the past twenty years, the knowledge and understanding of wastewater treatment have advanced extensively and moved away from empirically-based approaches to a first principles approach embracing chemistry, microbiology, physical and bioprocess engineering, and mathematics. Many of these advances have matured to the degree that they have been codified into mathematical models for simulation…
Mongameli Anthony Mabona (1929) is a singular South African scholar with an exceptional life path. Yet, he is a wrongly forgotten figure today. British imperialism and apartheid shaped the world into which he was born and, to a large extent, these powers carved out his destiny for him. Nevertheless, a curious set of coincidences enabled him to obtain a tertiary education as a priest, to pursue …
The Writing Spaces Web Writing Style Guide was created as a crowdsourcing project of Collaborvention 2011: A Computers and Writing Unconference. College writing teachers from around the web joined together to create this guide (see our Contributors list). The advice within it is based on contemporary theories and best practices. While the text was originally written for students in undergrad…
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Securit…
This book offers a critical introduction to the core technologies underlying the Internet from a humanistic perspective. It provides a cultural critique of computing technologies, by exploring the history of computing and examining issues related to writing, representing, archiving and searching. The book raises awareness of, and calls for, the digital humanities to address the challenges posed…
The geek is male. Or so it seems. As is well documented, there is a distinct under-representation of girls studying computing at high school level and, correspondingly, going on to have careers in IT. To address this problem, in 2007 the authors of this book, with backgrounds in secondary teaching or IT, trialled a new and revolutionary program in schools: "Digital Divas." The Digital Divas pro…
The COVID-19 pandemic resulted in a mass exodus of India’s migrant workers from the cities back to the villages. This book explores the social conditions and concerns around health, labour, migration, and gender that were thrown up as a result of this forced migration. The book examines the failings of the public health systems and the state response to address the humanitarian crisis whic…
AI Knowledge Transfer from the University to Society: Applications in High-Impact Sectors brings together examples from the "Innovative Ecosystem with Artificial Intelligence for Andalusia 2025" project at the University of Seville, a series of sub-projects composed of research groups and different institutions or companies that explore the use of Artificial Intelligence in a variety of high-im…