In this book, experts from academia and industry present the latest advances in scientific theory relating to applied electromagnetics and examine current and emerging applications particularly within the fields of electronics, communications, and computer technology. The book is based on presentations delivered at APPEIC 2014, the 1st Applied Electromagnetic International Conference, held in B…
The utilitarian philosopher and jurist Jeremy Bentham (1748–1832) argues in this collection of letters for the cessation of government control of the rate of interest. The work first appeared in 1787 and is reissued here in the version published in Dublin in 1788. The final letter, addressed to Adam Smith, is a response to Smith's Wealth of Nations (1776), arguing against the limits to invent…
Information Reuse and Integration addresses the efficient extension and creation of knowledge through the exploitation of Kolmogorov complexity in the extraction and application of domain symmetry. Knowledge, which seems to be novel, can more often than not be recast as the image of a sequence of transformations, which yield symmetric knowledge. When the size of those transformations and/or the…
The authors of this volume address multiple questions involving the nature of youth protest in the twenty-first century. Through their use of a case study approach, they comment upon the ways in which youth protest has been influenced by the electronic and social media and evaluate the effectiveness of protest activities, many of which were framed in reaction to neo-liberalism and state authori…
The Whole Truth About Whole Numbers is an introduction to the field of Number Theory for students in non-math and non-science majors who have studied at least two years of high school algebra. Rather than giving brief introductions to a wide variety of topics, this book provides an in-depth introduction to the field of Number Theory. The topics covered are many of those included in an introduct…
This book explores the generative power of vulnerabilities facing individuals who inhabit educational spaces. We argue that vulnerability can be an asset in developing understandings of others, and in interrogating the self. Explorations of vulnerability offer a path to building empathy and creating engaged generosity within a community of dissensus. This kind of self-examination is essential i…
This book presents interdisciplinary research that pursues the mutual enrichment of neuroscience and robotics. Building on experimental work, and on the wealth of literature regarding the two cortical pathways of visual processing - the dorsal and ventral streams - we define and implement, computationally and on a real robot, a functional model of the brain areas involved in vision-based graspi…
This volume provides updated, in-depth material on the application of intelligent optimization in biology and medicine. The aim of the book is to present solutions to the challenges and problems facing biology and medicine applications. This Volume comprises of 13 chapters, including an overview chapter, providing an up-to-date and state-of-the research on the application of intelligent optimiz…
This book presents the use of efficient Evolutionary Computation (EC) algorithms for solving diverse real-world image processing and pattern recognition problems. It provides an overview of the different aspects of evolutionary methods in order to enable the reader in reaching a global understanding of the field and, in conducting studies on specific evolutionary techniques that are related to …
This book constitutes the refereed conference proceedings of the 18th International Conference on the Applications of Evolutionary Computation, EvoApplications 2015, held in Copenhagen, Spain, in April 2015, colocated with the Evo 2015 events EuroGP, EvoCOP, and EvoMUSART. The 72 revised full papers presented were carefully reviewed and selected from 125 submissions. EvoApplications 2015 consis…