Advanced Computational Approaches for Predicting Tourist Arrivals: the Case of Charter Air-Travel
This SpringerBrief explores the motor performance and biomechanics of golf putting, providing methodologies, studies and approaches to this concept. Presenting outcomes of research published over the past six years, it offers guidelines from a scientifically oriented perspective, and employs new technologies and mathematical methods to assess golf putting. The chapters cover aspects such as pen…
This book provides an introduction to elementary probability and to Bayesian statistics using de Finetti's subjectivist approach. One of the features of this approach is that it does not require the introduction of sample space – a non-intrinsic concept that makes the treatment of elementary probability unnecessarily complicate – but introduces as fundamental the concept of random numbers d…
The advances of live cell video imaging and high-throughput technologies for functional and chemical genomics provide unprecedented opportunities to understand how biological processes work in subcellular and multicellular systems. The interdisciplinary research field of Video Bioinformatics is defined by Bir Bhanu as the automated processing, analysis, understanding, data mining, visualizati…
How Bulgaria transformed the computer industry behind the Iron Curtain—and the consequences of that transformation for a society that dreamt of a brighter future. Bulgaria in 1963 was a communist country led by a centralized party trying to navigate a multinational Cold War. The state needed money, and it sought prestige. By cultivating a burgeoning computer industry, Bulgaria achieved bot…
Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hacker…
This book introduces context-aware computing, providing definitions, categories, characteristics, and context awareness itself and discussing its applications with a particular focus on smart learning environments. It also examines the elements of a context-aware system, including acquisition, modelling, reasoning, and distribution of context. It also reviews applications of context-aware compu…
This book offers an accessible introduction and practical guide to Voice over Internet Protocol (VoIP) technology, providing readers with the know-how to solve the problems encountered in applying VoIP technology across all types of network. It incorporates the latest research findings and brings readers up to date with the challenges that are faced by researchers developing novel applications …
This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile communication, while bringing convenience, also means cyber threats are gro…
This book covers studies of computational thinking related to linking, infusing, and embedding computational thinking elements to school curricula, teacher education and STEM related subjects. Presenting the distinguished and exemplary works by educators and researchers in the field highlighting the contemporary trends and issues, creative and unique approaches, innovative methods, frameworks, …