The Blue Lattice Network


Book Description

Amethyst is in the Crow Territory, the last place she wanted to end up, but now she has to find a way to undo what she did at the sacred pond that made Sasha "Half-Blessed." The only issue is that they don't know who Sasha is, so they can't find his birth parents. As they plow through the Bluebird adoption registry, they come upon nothing. Meanwhile, Zora and Muse are each other’s throats over whether they should trust Sasha. Will the friendship between these four friends survive, or will they be eaten up by the society they tried to run from and protest against in the first place?




The Blue Lattice Network and Other Stories


Book Description

The Blue Lattice Network is a collection of short stories that all reside in the Bluebird Territory. A man-made nation that divides people by talents and personalities.




Muqarnas, Volume 26


Book Description

Muqarnas is sponsored by The Aga Khan Program for Islamic Architecture at Harvard University and the Massachusetts Institute of Technology, Cambridge, Massachusetts. Muqarnas 26 contains articles on a variety of topics that span and transcend the geographic and temporal boundaries that have traditionally defined the history of Islamic art and architecture. Contributors include Robert McChesney, Mattia Guidetti, Marcus Schadl, Christian Gruber, Katia Cytryn-Silverman, Doris Abouseif, Olga Bush, Emine Fetvaci, Moya Carey, Bernard O'Kane, Hadi Maktabi, Nadia Erzini and Stephen Vernoit.




The Half-Blessed


Book Description

On April 4th, 2071 many students of Amethyst's age fell from the sky as if there was a sudden change in gravity. The event was called simply The Falling. No one knows what caused it. People only knew all that fell had died and all that died were Lost Children. The Lost Children were children that were relocated during the famine that ravaged the majority of the crops in the Crow Territory, leaving many starving. Amethyst learns about her past as time goes on and where she belongs. As tensions rise as to whether or not these children should be returned to their birth parents after all this time, Amethyst is on the run with her adoptive mom. Meanwhile her close friends Sasha, Muse, and Zora are using grassroots efforts to stay within the Bluebird Territory. We follow all four friends as they find themselves caught in the middle of these decisions to fight to stay.




Introduction to Lattice Algebra


Book Description

Lattice theory extends into virtually every branch of mathematics, ranging from measure theory and convex geometry to probability theory and topology. A more recent development has been the rapid escalation of employing lattice theory for various applications outside the domain of pure mathematics. These applications range from electronic communication theory and gate array devices that implement Boolean logic to artificial intelligence and computer science in general. Introduction to Lattice Algebra: With Applications in AI, Pattern Recognition, Image Analysis, and Biomimetic Neural Networks lays emphasis on two subjects, the first being lattice algebra and the second the practical applications of that algebra. This textbook is intended to be used for a special topics course in artificial intelligence with a focus on pattern recognition, multispectral image analysis, and biomimetic artificial neural networks. The book is self-contained and – depending on the student’s major – can be used for a senior undergraduate level or first-year graduate level course. The book is also an ideal self-study guide for researchers and professionals in the above-mentioned disciplines. Features Filled with instructive examples and exercises to help build understanding Suitable for researchers, professionals and students, both in mathematics and computer science Contains numerous exercises.




Changing Connectomes


Book Description

An up-to-date overview of the field of connectomics, introducing concepts and mechanisms underlying brain network change at different stages. The human brain undergoes massive changes during its development, from early childhood and the teenage years to adulthood and old age. Across a wide range of species, from C. elegans and fruit flies to mice, monkeys, and humans, information about brain connectivity (connectomes) at different stages is now becoming available. New approaches in network neuroscience can be used to analyze the topological, spatial, and dynamical organization of such connectomes. In Changing Connectomes, Marcus Kaiser provides an up-to-date overview of the field of connectomics and introduces concepts and mechanisms underlying brain network changes during evolution and development.




Magnesium Batteries


Book Description

The quest for efficient and durable battery technologies is one of the key challenges for enabling the transition to renewable energy economies. This text comprehensively outlines the scientific and technical challenges in the field, covering anodes, cathodes, electrolytes, and particularly promising systems such as the Mg-S cell.




Topology of Disordered Networks and their Applications


Book Description

This eBook is a collection of articles from a Frontiers Research Topic. Frontiers Research Topics are very popular trademarks of the Frontiers Journals Series: they are collections of at least ten articles, all centered on a particular subject. With their unique mix of varied contributions from Original Research to Review Articles, Frontiers Research Topics unify the most influential researchers, the latest key findings and historical advances in a hot research area! Find out more on how to host your own Frontiers Research Topic or contribute to one as an author by contacting the Frontiers Editorial Office: frontiersin.org/about/contact.




Malware Diffusion Models for Modern Complex Networks


Book Description

Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks. Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios. - Presents a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators - Systematically introduces malware diffusion processes, providing the relevant mathematical background - Discusses malware modeling frameworks and how to apply them to complex wireless networks - Provides guidelines and directions for extending the corresponding theories in other application domains, demonstrating such possibility by using application models in information dissemination scenarios




Spike-timing dependent plasticity


Book Description

Hebb's postulate provided a crucial framework to understand synaptic alterations underlying learning and memory. Hebb's theory proposed that neurons that fire together, also wire together, which provided the logical framework for the strengthening of synapses. Weakening of synapses was however addressed by "not being strengthened", and it was only later that the active decrease of synaptic strength was introduced through the discovery of long-term depression caused by low frequency stimulation of the presynaptic neuron. In 1994, it was found that the precise relative timing of pre and postynaptic spikes determined not only the magnitude, but also the direction of synaptic alterations when two neurons are active together. Neurons that fire together may therefore not necessarily wire together if the precise timing of the spikes involved are not tighly correlated. In the subsequent 15 years, Spike Timing Dependent Plasticity (STDP) has been found in multiple brain brain regions and in many different species. The size and shape of the time windows in which positive and negative changes can be made vary for different brain regions, but the core principle of spike timing dependent changes remain. A large number of theoretical studies have also been conducted during this period that explore the computational function of this driving principle and STDP algorithms have become the main learning algorithm when modeling neural networks. This Research Topic will bring together all the key experimental and theoretical research on STDP.