Service Alert
Delay in delivery of CDs
We are currently experiencing a delay with CD production. CDs are being sent and will be delivered as soon as possible. We apologize for the inconvenience.
We are currently experiencing a delay with CD production. CDs are being sent and will be delivered as soon as possible. We apologize for the inconvenience.
Showing 1 - 20 of 48312 items
Unlock the core math and understand the technical nuances of quantum computing in this detailed guide. Delve into the practicality…
of NISQ algorithms, and survey promising advancements in quantum machine learning.Key FeaturesDiscover how quantum computing works and delve into the math behind it with practical examplesLearn about and assess the most up-to-date quantum computing topics including quantum machine learningExplore the inner workings of existing quantum computing technologies to understand how they may perform significantly better than their classical counterpartsBook DescriptionDancing with Qubits, Second Edition, is a comprehensive quantum computing textbook that starts with an overview of why quantum computing is so different from classical computing and describes several industry use cases where it can have a major impact. A full description of classical computing and the mathematical underpinnings of quantum computing follows, helping you better understand concepts such as superposition, entanglement, and interference. Next up are circuits and algorithms, both basic and sophisticated, as well as a survey of the physics and engineering ideas behind how quantum computing hardware is built. Finally, the book looks to the future and gives you guidance on understanding how further developments may affect you. This new edition is updated throughout with more than 100 new exercises and includes new chapters on NISQ algorithms and quantum machine learning. Understanding quantum computing requires a lot of math, and this book doesn't shy away from the necessary math concepts you'll need. Each topic is explained thoroughly and with helpful examples, leaving you with a solid foundation of knowledge in quantum computing that will help you pursue and leverage quantum-led technologies.What you will learnExplore the mathematical foundations of quantum computingDiscover the complex, mind-bending concepts that underpin quantum systemsUnderstand the key ideas behind classical and quantum computingRefresh and extend your grasp of essential mathematics, computing, and quantum theoryExamine a detailed overview of qubits and quantum circuitsDive into quantum algorithms such as Grover’s search, Deutsch-Jozsa, Simon’s, and Shor’sExplore the main applications of quantum computing in the fields of scientific computing, AI, and elsewhereWho this book is forDancing with Qubits, Second Edition, is a quantum computing textbook for all those who want to understand and explore the inner workings of quantum computing. This entails building up from basic to some sophisticated mathematics and is therefore best suited for those with a healthy interest in mathematics, physics, engineering, or computer science.By Shilpa Mahajan, Mehak Khurana, Vania Vieira Estrela. 2024
APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime,…
and identifying loopholes using artificial intelligence (AI) and machine learning (ML) Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection is a comprehensive look at state-of-the-art theory and practical guidelines pertaining to the subject, showcasing recent innovations, emerging trends, and concerns as well as applied challenges encountered, and solutions adopted in the fields of cybersecurity using analytics and machine learning. The text clearly explains theoretical aspects, framework, system architecture, analysis and design, implementation, validation, and tools and techniques of data science and machine learning to detect and prevent cyber threats. Using AI and ML approaches, the book offers strategic defense mechanisms for addressing malware, cybercrime, and system vulnerabilities. It also provides tools and techniques that can be applied by professional analysts to safely analyze, debug, and disassemble any malicious software they encounter. With contributions from qualified authors with significant experience in the field, Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection explores topics such as: Cybersecurity tools originating from computational statistics literature and pure mathematics, such as nonparametric probability density estimation, graph-based manifold learning, and topological data analysisApplications of AI to penetration testing, malware, data privacy, intrusion detection system (IDS), and social engineeringHow AI automation addresses various security challenges in daily workflows and how to perform automated analyses to proactively mitigate threatsOffensive technologies grouped together and analyzed at a higher level from both an offensive and defensive standpoint Providing detailed coverage of a rapidly expanding field, Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection is an essential resource for a wide variety of researchers, scientists, and professionals involved in fields that intersect with cybersecurity, artificial intelligence, and machine learning.By Jill Abramson. 2015
Former executive editor of The New York Times and one of our most eminent journalists Jill Abramson provides a &“valuable…
and insightful&” (The Boston Globe) report on the disruption of the news media over the last decade, as shown via two legacy (The New York Times and The Washington Post) and two upstart (BuzzFeed and VICE) companies as they plow through a revolution that pits old vs. new media.&“A marvelous book&” (TheNew York Times Book Review), Merchants of Truth is the groundbreaking and gripping story of the precarious state of the news business.The new digital reality nearly kills two venerable newspapers with an aging readership while creating two media behemoths with a ballooning and fickle audience of millennials. &“Abramson provides this deeply reported insider account of an industry fighting for survival. With a keen eye for detail and a willingness to interrogate her own profession, Abramson takes readers into the newsrooms and boardrooms of the legacy newspapers and the digital upstarts that seek to challenge their dominance&” (Vanity Fair). We get to know the defenders of the legacy presses as well as the outsized characters who are creating the new speed-driven media competitors. The players include Jeff Bezos and Marty Baron (TheWashington Post), Arthur Sulzberger and Dean Baquet (TheNew York Times), Jonah Peretti (BuzzFeed), and Shane Smith (VICE) as well as their reporters and anxious readers.Merchants of Truth raises crucial questions that concern the well-being of our society. We are facing a crisis in trust that threatens the free press. &“One of the best takes yet on journalism&’s changing fortunes&” (Publishers Weekly, starred review), Abramson&’s book points us to the future.By George Gilder. 2000
The computer age is over. After a cataclysmic global run of thirty years, it has given birth to the age…
of the telecosm -- the world enabled and defined by new communications technology. Chips and software will continue to make great contributions to our lives, but the action is elsewhere. To seek the key to great wealth and to understand the bewildering ways that high tech is restructuring our lives, look not to chip speed but to communication power, or bandwidth. Bandwidth is exploding, and its abundance is the most important social and economic fact of our time. George Gilder is one of the great technological visionaries, and "the man who put the 's' in 'telecosm'" (Telephony magazine). He is equally famous for understanding and predicting the nuts and bolts of complex technologies, and for putting it all together in a soaring view of why things change, and what it means for our daily lives. His track record of futurist predictions is one of the best, often proving to be right even when initially opposed by mighty corporations and governments. He foresaw the power of fiber and wireless optics, the decline of the telephone regime, and the explosion of handheld computers, among many trends. His list of favored companies outpaced even the soaring Nasdaq in 1999 by more than double. His long-awaited Telecosm is a bible of the new age of communications. Equal parts science story, business history, social analysis, and prediction, it is the one book you need to make sense of the titanic changes underway in our lives. Whether you surf the net constantly or not at all, whether you live on your cell phone or hate it for its invasion of private life, you need this book. It has been less than two decades since the introduction of the IBM personal computer, and yet the enormous changes wrought in our lives by the computer will pale beside the changes of the telecosm. Gilder explains why computers will "empty out," with their components migrating to the net; why hundreds of low-flying satellites will enable hand-held computers and communicators to become ubiquitous; why television will die; why newspapers and magazines will revive; why advertising will become less obnoxious; and why companies will never be able to waste your time again. Along the way you will meet the movers and shakers who have made the telecosm possible. From Charles Townes and Gordon Gould, who invented the laser, to the story of JDS Uniphase, "the Intel of the Telecosm," to the birthing of fiberless optics pioneer TeraBeam, here are the inventors and entrepreneurs who will be hailed as the next Edison or Gates. From hardware to software to chips to storage, here are the technologies that will soon be as basic as the air we breathe.By Alua Arthur. 2024
A deeply transformative memoir that reframes how we think about death and how it can help us lead better, more…
fulfilling and authentic lives, from America’s most visible death doula."A truly unique, inspiring perspective on the time we have, what we do with it, and how we let go of this world.... There is no one I'd trust more to guide me through an understanding of death, and how it informs life." — Jodi Picoult, New York Times bestselling author of Mad Honey and The Book of Two Ways"Briefly Perfectly Human is a beautiful, raw, light-bringing experience. Alua's voice is shimmering, singular, and pulses with humor, vulnerability, insight, and refreshing candor.... Be prepared for it to grab you, hold you tight, and raise the roof on the power of human connection." — Tembi Locke, author of From Scratch: A Memoir of Love, Sicily, and Finding HomeFor her clients and everyone who has been inspired by her humanity, Alua Arthur is a friend at the end of the world. As our country’s leading death doula, she’s spreading a transformative message: thinking about your death—whether imminent or not—will breathe wild, new potential into your life.Warm, generous, and funny AF, Alua supports and helps manage end-of-life care on many levels. The business matters, medical directives, memorial planning; but also honoring the quiet moments, when monitors are beeping and loved ones have stepped out to get some air—or maybe not shown up at all—and her clients become deeply contemplative and want to talk. Aching, unfinished business often emerges. Alua has been present for thousands of these sacred moments—when regrets, fears, secret joys, hidden affairs, and dim realities are finally said aloud. When this happens, Alua focuses her attention at the pulsing center of her clients’ anguish and creates space for them, and sometimes their loved ones, to find peace.This has had a profound effect on Alua, who was already no stranger to death’s periphery. Her family fled a murderous coup d’état in Ghana in the 1980s. She has suffered major, debilitating depressions. And her dear friend and brother-in-law died of lymphoma. Advocating for him in his final months is what led Alua to her life’s calling. She knows firsthand the power of bearing witness and telling the truth about life’s painful complexities, because they do not disappear when you look the other way. They wait for you.Briefly Perfectly Human is a life-changing, soul-gathering debut, by a writer whose empathy, tenderness, and wisdom shimmers on the page. Alua Arthur combines intimate storytelling with a passionate appeal for loving, courageous end-of-life care—what she calls “death embrace.” Hers is a powerful testament to getting in touch with something deeper in our lives, by embracing the fact of our own mortality. “Hold that truth in your mind,” Alua says, “and wondrous things will begin to grow around it.”By Rohit Anand, Abhinav Juneja, Digvijay Pandey, Sapna Juneja, Nidhi Sindhwani. 2024
META-HEURISTIC ALGORITHMS FOR ADVANCED DISTRIBUTED SYSTEMS Discover a collection of meta-heuristic algorithms for distributed systems in different application domains Meta-heuristic…
techniques are increasingly gaining favor as tools for optimizing distributed systems—generally, to enhance the utility and precision of database searches. Carefully applied, they can increase system effectiveness, streamline operations, and reduce cost. Since many of these techniques are derived from nature, they offer considerable scope for research and development, with the result that this field is growing rapidly. Meta-Heuristic Algorithms for Advanced Distributed Systems offers an overview of these techniques and their applications in various distributed systems. With strategies based on both global and local searching, it covers a wide range of key topics related to meta-heuristic algorithms. Those interested in the latest developments in distributed systems will find this book indispensable. Meta-Heuristic Algorithms for Advanced Distributed Systems readers will also find: Analysis of security issues, distributed system design, stochastic optimization techniques, and more Detailed discussion of meta-heuristic techniques such as the genetic algorithm, particle swam optimization, and many others Applications of optimized distribution systems in healthcare and other key??industries Meta-Heuristic Algorithms for Advanced Distributed Systems is ideal for academics and researchers studying distributed systems, their design, and their applications.By Scott Riley. 2024
Learn to create seamless designs backed by a responsible understanding of the human mind. This new edition is fully updated and…
reworked to employ a realistic, challenging, and practical approach to interface design, presenting state of the art scientific studies in behavioral sciences, interface design and the psychology of design. All with modern, up-to-date examples and screenshots. The practical portion of this edition has been completely reworked, giving you the chance to follow along with a real, proven design process that has produced several successful products imbued with the principles of mindful, responsible design.You'll examine how human behavior can be used to integrate your product design into lifestyle, rather than interrupt it, and make decisions for the good of those that are using your product. You will also learn about the neurological aspects and limitations of human vision and perception; about our attachment to harmony and dissonance; and about our brain’s propensity towards pattern recognition and how we perceive the world around us. In the second half of the book, you’ll follow along with the key phases of a design project, implementing what you have learned in an end-to-end, practical setting. Design is a responsibility, but not enough designers understand the human mind or the process of thought. Mindful Design, Second Edition introduces the areas of brain science that matter to designers, and passionately explains how those areas affect each human’s day-to-day experiences with products and interfaces, providing a battle-tested toolkit to help you make responsible design decisions. What You'll Learn Review how attention and distraction work and the cost of attentional switchingUse Gestalt principles to communicate visual groupingEnsure your underlying models make sense to your audienceUse time, progression, and transition to create a compositionCarefully examine controlling behavior through reductionist and behaviorist motivation concepts Apply the theoretical knowledge to practical, mindful interface design Who This Book Is For The primary audience for this book is professional designers who wish to learn more about the human mind and how to apply that to their work. The book is also useful for design-focused product owners and startup founders who wish to apply ethical thinking to a team, or when bootstrapping their products. The secondary audience is design students who are either studying a ‘traditional’ visual design course, or a UX/interaction design course who have a desire to learn how they might be able to apply mindful design to their early careers. Finally, a tertiary audience for this book would be tutors involved in teaching design, or peripheral, courses who may wish to incorporate its teachings into their lectures, workshops or seminars.By Durgesh Mishra, Xin She Yang, Aynur Unal, Dharm Singh Jat. 2024
This book features high-quality research papers presented at the Third International Conference on Data Science and Big Data Analytics (IDBA…
2023), organized by Sri Aurobindo Institute of Technology, Indore, India, in association with ACM and IEEE Computer Society in hybrid mode during June 16–17, 2023. This book discusses the topics such as data science, artificial intelligence, machine learning, quantum computing, big data and cloud security, computation security, big data security, information security, forecasting, data analytics, mathematics for data science, graph theory and application in data science, data visualization, computer vision, and analytics for social networks.This book proceedings addresses a crucial gap in understanding the impact of technology on Business Model Innovation (BMI). It emphasizes…
the need for further research to explore the intricate relationship between technology and BMI, focusing on opportunities and challenges. By delving into how technology influences emerging business model innovations and enhances operational efficiency, the publication aims to advance knowledge. Inviting diverse research methods, it sheds light on various ideas within the technology and BMI realm. Tailored for students, scholars, professionals, and policymakers, this book contributes to the evolving field of BMI and technology.Research Software Engineering: A Guide to the Open Source Ecosystem strives to give a big-picture overview and an understanding of…
the opportunities of programming as an approach to analytics and statistics. The book argues that a solid "programming" skill level is not only well within reach for many but also worth pursuing for researchers and business analysts. The ability to write a program leverages field-specific expertise and fosters interdisciplinary collaboration as source code continues to become an important communication channel. Given the pace of the development in data science, many senior researchers and mentors, alongside non-computer science curricula lack a basic software engineering component. This book fills the gap by providing a dedicated programming-with-data resource to both academic scholars and practitioners.Key Features overview: breakdown of complex data science software stacks into core components applied: source code of figures, tables and examples available and reproducible solely with license cost-free, open source software reader guidance: different entry points and rich references to deepen the understanding of selected aspectsBy Brian Allen. 2024
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseBy Amir Husain. 2017
&“A must-read for anyone looking to understand how artificial intelligence is poised to transform human society and life.&” —Paul Scharre,…
Author of Four Battlegrounds: Power in the Age of Artificial IntelligenceThe future is now. Acclaimed technologist and inventor Amir Husain explains how we can live amidst the coming age of sentient machines and artificial intelligence—and not only survive, but thrive.Artificial &“machine&” intelligence is playing an ever-greater role in our society. We are already using cruise control in our cars, automatic checkout at the drugstore, and are unable to live without our smartphones. The discussion around AI is polarized; people think either machines will solve all problems for everyone, or they will lead us down a dark, dystopian path into total human irrelevance. Regardless of what you believe, the idea that we might bring forth intelligent creation can be intrinsically frightening. But what if our greatest role as humans so far is that of creators?Amir Husain, a brilliant inventor and computer scientist, argues that we are on the cusp of writing our next, and greatest, creation myth. It is the dawn of a new form of intellectual diversity, one that we need to embrace in order to advance the state of the art in many critical fields, including security, resource management, finance, and energy. &“In The Sentient Machine, Husain prepares us for a brighter future; not with hyperbole about right and wrong, but with serious arguments about risk and potential&” (Dr. Greg Hyslop, Chief Technology Officer, The Boeing Company). He addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intelligent? What constitutes progress for us? And how might we fail to progress? Husain boils down complex computer science and AI concepts into clear, plainspoken language and draws from a wide variety of cultural and historical references to illustrate his points. Ultimately, Husain challenges many of our societal norms and upends assumptions we hold about &“the good life.&”This volume LNCS 14300 constitutes the refereed proceedings of the 18th International Conference, IFM 2023, in November 2023, held in…
Leiden, The Netherlands. The 16 full papers presented together with 2 short papers were carefully reviewed and selected from 51 submissions. The conference focuses on all aspects of the design of integrated techniques, including language design, verification and validation, automated tool support, and the use of such techniques in software engineering practice.By Stefan Schiffner, Sebastien Ziegler, Adrian Quesada Rodriguez. 2022
This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the…
Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies. Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids. It includes selected papers from the Privacy Symposium conference 2022 (PSC 2022) call for papers, encompassing relevant topics, including: international law and comparative law in data protection cross-border data transfers emerging technologies and data protection compliance data protection by design technologic solutions for data protection compliance data protection good practices across industries and verticals cybersecurity and data protection assessment and certification of data protection compliance, and data subject rights implementation This publication includes papers authored by academics and professionals involved on various areas of data protection, technical, legal and compliance services.Chapter 10 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.comBy Robin Romm. 2009
When Robin Romm's The Mother Garden was published, The New York Times Book Review called her "a close-up magician," saying,…
"hers is the oldest kind [of magic] we know: the ordinary incantation of words and stories to help us navigate the darkness and finally to hold the end at bay." In her searing memoir The Mercy Papers, Romm uses this magic to expand the weeks before her mother's death into a story about a daughter in the moments before and after loss. With a striking mix of humor and honesty, Romm ushers us into a world where an obstinate hospice nurse tries to heal through pamphlets and a yelping grandfather squirrels away money in a shoe-shine kit. Untrained dogs scamper about as strangers and friends rally around death, offering sympathy as they clamor for attention. The pillbox turns quickly into a metaphor for order; questions about medication turn to musings about God. The mundane and spiritual melt together as Romm reveals the sharp truths that lurk around every corner and captures, with great passion, the awe, fear, and fury of a daughter losing her mother. The Mercy Papers was started in the midst of heartbreak, and not originally intended for an audience. The result is a raw, unsentimental book that reverberates with humanity. Robin Romm has created a tribute to family and an indelible portrait that will speak to anyone who has ever loved and lost.By Volodymyr Tonkonogyi, Vitalii Ivanov, Justyna Trojanowska, Gennadii Oborskyi, Milan Edl, Ivan Kuric, Ivan Pavlenko, Predrag Dasic. 2020
This book offers a timely yet comprehensive snapshot of innovative research and developments in the area of manufacturing. It covers…
a wide range of manufacturing processes, such as cutting, coatings, and grinding, highlighting the advantages provided by the use of new materials and composites, as well as new methods and technologies. It discusses topics in energy generation and pollution prevention. It shows how computational methods and mathematical models have been applied to solve a number of issues in both theoretical and applied research. Based on selected papers presented at the Grabchenko’s International Conference on Advanced Manufacturing Processes (InterPartner-2019), held in Odessa, Ukraine on September 10-13, 2019, this book offers a timely overview and extensive information on trends and technologies in the area of manufacturing, mechanical and materials engineering. It is also intended to facilitate communication and collaboration between different groups working on similar topics, and to offer a bridge between academic and industrial researchers.By Juan Julian Merelo, Fernando Melício, José M. Cadenas, António Dourado, Kurosh Madani, António Ruano, Joaquim Filipe. 2019
This book gathers revised and extended versions of the best papers presented at the 8th International Joint Conference on Computational…
Intelligence (IJCCI 2016), which was held in Porto, Portugal from 9 to 11 November 2016. The papers address three main fields of Computational Intelligence, namely: Evolutionary Computation, Fuzzy Computation, and Neural Computation. In addition to highlighting recent advances in these areas, the book offers veteran researchers new and innovative solutions, while also providing a source of information and inspiration for newcomers to the field.By Andrew Meredith. 2014
“A darkly funny memoir about family reckonings” (O, The Oprah Magazine)—the story of a young man who, by handling the…
dead, makes peace with the living.Andrew Meredith’s father, a literature professor at La Salle University, was fired after unspecified allegations of sexual misconduct. It’s a transgression that resulted in such long-lasting familial despair that Andrew cannot forgive him. In the wake of the scandal, he frantically treads water, stuck in a kind of suspended adolescence—falling in and out of school, moving blindly from one half-hearted relationship to the next. When Andrew is forced to move back home to his childhood neighborhood in Northeast Philadelphia and take a job alongside his father as a “remover,” the name for those unseen, unsung men whose charge it is to take away the dead from their last rooms, he begins to see his father not through the lens of a wronged and resentful child, but through that of a sympathetic, imperfect man.Called “artful” and “compelling” by Thomas Lynch in The Wall Street Journal, Meredith’s poetic voice is as unforgettable as his story, and “he tucks his bittersweet childhood memories between tales of removals as carefully as the death certificates he slips between the bodies he picks up and the stretcher-like contraption that transports each body to the waiting vehicle” (Minneapolis Star-Tribune). “Potent” (Publishers Weekly), and “ultimately rewarding” (The Boston Globe), The Removers is a searing, coming-of-age memoir with “lyrical language and strong sense of place” (The Philadelphia Inquirer).By Bob Hughes. 2016
It’s hammered into us from birth that ‘all good things come at a price’. Today, that price looks apocalyptic, with…
wars, exploitation and environmental collapse in every part of the globe. Some suggest that the carnage is “a price worth paying” for technological progress. No pain, no gain. But technology is precisely the business of minimising the costs and impacts of existence… and by whole orders of magnitude. By now, all human beings should be leading creative, leisure-filled lives in a pristine world of burgeoning diversity. So how did it go so wrong? In a word, inequality. In The Bleeding Edge, Bob Hughes argues that unequal societies are incapable of using new technologies well. Wherever elites exist, self-preservation decrees that they must take control of new technologies to protect and entrench their status, rather than satisfy people’s needs. Hughes pursues the latest discoveries about the effects of social inequality on human health, into the field of human environmental impact, and traces today’s ecological crisis back to the rise of the world’s first elites, 5,000 years ago. He argues that new technologies have never emerged from elites or from the clash of competitive forces, but from largely voluntary, egalitarian collaborations of the kind that produced the world’s first working computers. Finally, Hughes shows that an egalitarian world is not ‘pie in the sky' but our evolutionary homeland, the glue that holds societies together, and the “cradle of invention” from which all our best ideas emerge. The book concludes: ‘Let’s assume that the commitment to human equality that’s written into the Universal Declaration of Human Rights means exactly what it says, and take it from there.’By Takuya Funatomi, Takahiro Okabe. 2024
Most cameras are inherently designed to mimic what is seen by the human eye: they have three channels of RGB…
and can achieve up to around 30 frames per second (FPS). However, some cameras are designed to capture other modalities: some may have the ability to capture spectra from near UV to near IR rather than RGB, polarimetry, different times of light travel, etc. Such modalities are as yet unknown, but they can also collect robust data of the scene they are capturing. This book will focus on the emerging computer vision techniques known as computational imaging. These include capturing, processing and analyzing such modalities for various applications of scene understanding.