LEADER 01911nam 2200421 n 450 001 996383796703316 005 20200824120944.0 035 $a(CKB)1000000000598082 035 $a(EEBO)2248508080 035 $a(UnM)99856875e 035 $a(UnM)99856875 035 $a(EXLCZ)991000000000598082 100 $a19921110d1634 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 04$aThe Christian warfare$b[electronic resource] $eagainst the Deuill world and flesh wherein is described their nature, the maner of their fight and meanes to obtaine victorye. By Iohn Downame Bachelar in Divinity and preacher of Gods word 205 $a[The fourth edition, corrected and enlarged by the authour, as appeareth in the epistle to the reader]. 210 $aLondon $cPrinted by William Stansby [for Philemon Stephens and Christopher Meredith$d1634] 215 $a[72], 1167, [47] p 300 $aThe title page is engraved and signed: Io: Payne scul:. 300 $aThe first leaf bears verses, "The front opened". 300 $aIn four parts, each with separate letterpress title page, the first dated 1634, the others 1633. The first bears the edition statement. The fourth has imprint "London printed by William Stansby, for Philemon Stephens and Christopher Meredith, at the Golden Lyon in Pauls Church-yard, 1633". Pagination and register are continuous. 300 $aIncludes index. 300 $aWith a final colophon leaf. 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 606 $aTemptation$vEarly works to 1800 615 0$aTemptation 700 $aDowname$b John$fd. 1652.$0845470 702 $aPayne$b John$fd. 1647?, 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996383796703316 996 $aThe Christian warfare$92371481 997 $aUNISA LEADER 09056nam 2200553 450 001 996490344003316 005 20231110224436.0 010 $a3-030-96562-7 035 $a(CKB)5840000000091757 035 $a(MiAaPQ)EBC7102194 035 $a(Au-PeEL)EBL7102194 035 $a(PPN)264954033 035 $a(EXLCZ)995840000000091757 100 $a20230225d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aPredicting pandemics in a globally connected world$hVolume 1 $etoward a multiscale, multidisciplinary framework through modeling and simulation /$fedited by Nicola Bellomo and Mark A. J. Chaplain 210 1$aCham, Switzerland :$cBirkha?user,$d[2022] 210 4$d©2022 215 $a1 online resource (314 pages) 225 1 $aModeling and Simulation in Science, Engineering and Technology 311 $a3-030-96561-9 327 $aIntro -- Preface -- Contents -- Modelling, Simulations, and Social Impact of Evolutionary Virus Pandemics -- 1 Aims and Plan of the Chapter -- 2 On the Contents of the Edited Book -- 3 Reasonings on Research Perspectives -- References -- Understanding COVID-19 Epidemics: A Multi-Scale ModelingApproach -- 1 Introduction -- 2 Mathematical Modeling Applied to Infectious Diseases: COVID-19 as a Case Study -- 2.1 The SIR and SHAR Models -- 2.2 The SHARUCD Modeling Framework -- 2.3 Modeling the Implementation of Control Measures -- 2.4 The Refined SHARUCD Model -- 2.4.1 Further Refinements: Detection Rate and Import -- 3 KTAP Modeling Framework -- 3.1 Modeling Contagion, Progression, and Recovery -- 3.2 Application of the KTAP Model to Selected Case Studies -- 3.2.1 Effect of Lockdown Measures and Restrictions Lifting -- 3.2.2 Effect of Heterogeneity -- 4 Discussion -- References -- Kinetic Modelling of Epidemic Dynamics: Social Contacts, Control with Uncertain Data, and Multiscale Spatial Dynamics -- 1 Introduction -- 2 Kinetic Modelling of Social Heterogeneity in Epidemic Dynamics -- 2.1 Modelling Contact Heterogeneity -- 2.1.1 Kinetic Model for Contact Formation -- 2.1.2 Quasi-Invariant Scaling and Steady States -- 2.1.3 The Macroscopic Social-SIR Dynamics -- 2.1.4 A Social-SIR Model with Saturated Incidence Rate -- 2.1.5 Extrapolation of the Shape of the Incidence Rate from Data -- 2.2 The Interplay Between Economy and the Pandemic -- 2.2.1 Wealth Exchanges in Epidemic Modelling -- 2.2.2 Fokker-Planck Scaling and Steady States -- 2.2.3 The Formation of Bimodal Wealth Distributions -- 2.2.4 The Increase of Wealth Inequalities -- 3 Social Control and Data Uncertainty -- 3.1 Control of Socially Structured Models -- 3.1.1 Optimal Control Formulation -- 3.1.2 Feedback Controlled Compartmental Models. 327 $a3.1.3 Containment in Homogeneous Social Mixing Dynamics -- 3.2 Dealing with Data Uncertainty -- 3.2.1 Feedback Controlled and Socially Structured Models with Uncertain Inputs -- 3.2.2 Application to the COVID-19 Outbreak -- 4 Multiscale Transport Models -- 4.1 Spatial Dynamics on Networks -- 4.1.1 1D Hyperbolic Compartmental Model -- 4.1.2 Macroscopic Formulation and Diffusion Limit -- 4.1.3 Extension to Multi-Compartmental Modelling -- 4.1.4 Network Modelling -- 4.1.5 Effect of Spatially Heterogeneous Environments in Hyperbolic and Parabolic Configuration -- 4.1.6 Application to the Emergence of COVID-19 in Italy -- 4.2 Realistic Geographical Settings -- 4.2.1 2D Kinetic Transport Model -- 4.2.2 Macroscopic Formulation and Diffusion Limit -- 4.2.3 Extension to Multi-Compartmental Modelling -- 4.2.4 Application to the Spatial Spread of COVID-19 in Italy in Emilia-Romagna and Lombardy Region -- 5 Concluding Remarks and Research Perspectives -- 5.1 Data sources -- References -- The COVID-19 Pandemic Evolution in Hawai`i and New Jersey: A Lesson on Infection Transmissibility and the Role of HumanBehavior -- 1 Introduction -- 2 Mathematical Models -- 2.1 Agent-Based Models -- 2.1.1 COVID-19 Agent-Based Simulator (Covasim) -- 2.2 Compartmental SEIR Models and Variants -- 2.3 Comparison of Agent-Based and Compartmental Models -- 3 Archipelagos and Islands -- 3.1 March 2020-June 2021 -- 3.1.1 CM Model Fit from March 06, 2020 to January 15, 2021 -- 3.1.2 Comparing CM and ABM Models -- 3.2 July 2021-September 2021 -- 3.3 Discussion -- 4 The Pandemic Waves in New Jersey -- 4.1 Comparing New Jersey to the US -- 4.2 Spatial and Temporal Patterns in COVID-19 Cases in New Jersey -- 4.3 Sociodemographic Variables -- 4.4 Discussion -- 5 The Use of Compartmental Models in New Jersey -- 5.1 Time-Evolution of the Basic Reproduction Number. 327 $a5.2 Infected Confirmed Cases, Hospitalizations, and Deaths -- 5.3 Discussion -- 6 Conclusion -- References -- A Novel Point Process Model for COVID-19: Multivariate Recursive Hawkes Process -- 1 Introduction -- 1.1 Hawkes Point Process Modeling of Infectious Diseases -- 1.2 Multivariate Hawkes Processes -- 1.3 Recursive Hawkes Processes -- 1.4 Outline -- 2 Theoretical Properties of Temporal Multivariate Recursive Hawkes Models -- 2.1 Existence -- 2.2 Mean -- 2.3 Variance -- 3 Parameter Fitting and Simulation Algorithms -- 3.1 Parameter Fitting Algorithms -- 3.1.1 Parametric (or Semi-parametric) Estimation -- 3.1.2 Temporal Version of Parameter Fitting Algorithms -- 3.2 Simulation Algorithm -- 4 Reconstruct Multivariate Point Process from Data with Imprecise Time -- 4.1 Time Reconstruction -- 4.2 Category Index Reconstruction -- 5 Numerical Experiments and Results -- 5.1 Synthetic Data Sets -- 5.1.1 Comparison Between Parametric Fitting and Non-parametric Fitting -- 5.1.2 Verification of the Parameter Fitting Algorithm -- 5.1.3 Experiments About Data Sets with Imprecise Time -- 5.2 Experiments on Real COVID-19 Data -- 5.2.1 Model Validation -- 5.2.2 Prediction Based on MRHP and Historical Information -- 6 Conclusion -- References -- Multiscale Aspects of Virus Dynamics -- 1 Introduction -- 1.1 On the Biology of the Virus -- 1.2 Modeling the Complexity of COVID-19 -- 2 Epistemic and Empirical Uncertainties in Compartmental and Individual-Based Models -- 2.1 SIR Model -- 2.2 Individual-Based Interpretation of ? -- 2.3 An Example of Modified SIR Model -- 2.4 Individuals Behind the Modified SIR Model -- 2.5 Time-Discretization -- 3 The Individual-Based Model of FlaLaFauciRiva -- 3.1 A Formula for the Parameter ? of Compartmental Models -- 3.2 Analysis of the Fluctuations -- 3.3 Simulations -- 3.4 Presence of Immunized Population and Virus Variants. 327 $aAppendix -- References -- Productivity in Times of Covid-19: An Agent-Based Model Approach -- 1 Introduction -- 2 Model -- 3 Mean Field Approximation -- 4 Setting the Model Functions -- 5 Simulations -- 6 Conclusion -- References -- Transmission Dynamics and Quarantine Control of COVID-19 in Cluster Community -- 1 Introduction -- 2 Mathematical Modeling -- 2.1 Stage 1: SEIR-Type Model Without Quarantine -- 2.2 Stage 2: Transmission-Quarantine (TQ) Model -- 3 Analytic Results and Case Study for Emerging Stage -- 3.1 Analytic Results -- 3.2 A Real World Case Study for Stage 1 -- 4 Case Study and Sensitivity Analysis for Quarantine Stage -- 4.1 A Real World Study for Stage 2 -- 4.2 Sensitivity Analysis -- 5 Discussion -- Appendix: Proofs of Theorems -- References -- A 2D Kinetic Model for Crowd Dynamics with Disease Contagion -- 1 Introduction -- 2 A Simplified Two-Dimensional Kinetic Model -- 3 Discretization in Space and Time -- 4 Numerical Results -- 4.1 Tests with v = 0 -- 4.2 Tests with Prescribed Walking Velocity -- 5 A More Complex 2D Kinetic Model -- 6 Conclusions -- References -- Multiscale Derivation of a Time-Dependent SEIRD Reaction-Diffusion System for COVID-19 -- 1 Introduction -- 2 Phenomenological Modeling of Diffusion Population Dynamics -- 3 From Kinetic Theory Model to SEIRD Reaction-Diffusion System -- 3.1 Kinetic Theory Model -- 3.2 Micro-Macro Formulation -- 4 Numerical Method -- 4.1 Semi-Implicit Time Discretization -- 4.2 Fully Discrete Asymptotic Preserving Numerical Scheme in 1D -- 4.3 Boundary Conditions -- 5 Numerical Results -- 5.1 Test 1: Asymptotic Preserving Numerical Scheme Property -- 5.2 Test 2: Diffusion Effect -- 5.3 Test 3: Role of the Transmission Function -- 6 Conclusion and Perspectives -- References. 410 0$aModeling and Simulation in Science, Engineering and Technology 606 $aEpidemiology$xMathematical models 606 $aEpidèmies$2thub 606 $aCOVID-19$2thub 606 $aModels matemàtics$2thub 608 $aLlibres electrònics$2thub 615 0$aEpidemiology$xMathematical models. 615 7$aEpidèmies 615 7$aCOVID-19 615 7$aModels matemàtics 676 $a016.36229 702 $aBellomo$b N. 702 $aChaplain$b M. A. J. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996490344003316 996 $aPredicting pandemics in a globally connected world$93019326 997 $aUNISA LEADER 06165nam 22008415 450 001 9910484517203321 005 20251226200513.0 010 $a3-319-31960-4 024 7 $a10.1007/978-3-319-31960-5 035 $a(CKB)3710000000627374 035 $a(SSID)ssj0001657902 035 $a(PQKBManifestationID)16437598 035 $a(PQKBTitleCode)TC0001657902 035 $a(PQKBWorkID)14986554 035 $a(PQKB)11575384 035 $a(DE-He213)978-3-319-31960-5 035 $a(MiAaPQ)EBC5586870 035 $a(Au-PeEL)EBL5586870 035 $a(OCoLC)945920275 035 $a(PPN)192772090 035 $a(EXLCZ)993710000000627374 100 $a20160330d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDigital-Forensics and Watermarking $e14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers /$fedited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XVI, 448 p. 224 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9569 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-31959-0 327 $aDigital Forensics -- Image Noise and Digital Image Forensics -- Camera Source Identification with Limited Labeled Training Set -- Detecting Video Forgery By Estimating Extrinsic Camera Parameters -- Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An Advanced Texture Analysis Method for Image Sharpening Detection -- Source Camera Model Identification Using Features from contaminated Sensor Noise -- Inter-frame Forgery Detection for Static-Background Video Based on MVP Consistency -- An Effective Detection Method Based On Physical Traits of Recaptured Images On LCD Screens -- Steganography and Steganalysis -- Video Steganalysis Based on Intra Prediction Mode Calibration -- Feature Selection for High Dimensional Steganalysis -- Syntheticspeech detection and audio steganography in VoIP scenarios -- Digital Watermarking -- Fingerprinting for Broadcast Content Distribution System -- Image Watermarking Based on Reflectance Modification -- Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes -- An Authentication and Recovery Scheme for Digital Speech Signal based on DWT -- Enrichment of Visual Appearance of Aesthetic QR Code -- Nondestructive Readout of Copyright Information Embedded in Objects Fabricated with 3-D Printers -- Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation -- Self-embedding Watermarking Scheme Based on MDS Codes -- Watermarking Method using Concatenated Code for Scaling and Rotation Attacks -- DCT-OFDM Based Watermarking Scheme Robust against Clipping, Rotation, and Scaling Attacks -- Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking -- Detection of frequency-scale modification using robust audio watermarking based on amplitude modulation -- Audio Watermarking Using Different Wavelet Filters -- Reversible Data Hiding -- A Commutative Encryption and Reversible Watermarking for Fingerprint Image -- Distortion-Free Robust Reversible Watermarking By Modifying and Recording IWT Means of Image Blocks -- Reversible Data Hiding for Encrypted Audios by High Order Smoothness -- Completely Separable Reversible Data Hiding in Encrypted Images -- Optimal Histogram-pair and Prediction-error Based Reversible Data Hiding for Medical Images -- Visual Cryptography -- Authenticated Secret Sharing Scheme Based on GMEMD -- Robust Content-Based Image Hash Functions Using Nested Lattice Codes -- An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion -- A New Construction of Tagged Visual Cryptography Scheme. 330 $aThis book constitutes revised selected papers from the 14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015, held in Tokyo, Japan, in October 2015. The 35 papers presented in this volume were carefully reviewed and selected from 54 submissions. The contributions are organized in topical sections named: digital forensics; steganography and steganalysis; digital watermarking; reversible data hiding; and visual cryptography. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9569 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aAlgorithms 606 $aComputers and civilization 606 $aCoding theory 606 $aInformation theory 606 $aCryptology 606 $aData and Information Security 606 $aAlgorithms 606 $aComputers and Society 606 $aCoding and Information Theory 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aComputers and Society. 615 24$aCoding and Information Theory. 676 $a005.82 702 $aShi$b Yun-Qing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Hyoung Joong$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPe?rez Gonza?lez$b Fernando$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aEchizen$b Isao$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484517203321 996 $aDigital Forensics and Watermarking$93004628 997 $aUNINA