With the development of big data, data sharing has become increasingly popular and important in optimizing resource allocation and improving information utilization. Meer
This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on December 20, 2019. Meer
This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine Learning, Image Processing, Network Security and Data Sciences, MIND 2020, held in Silchar, India. Meer
This book explores various applications of deep learning to the diagnosis of cancer,while also outlining the future face of deep learning-assisted cancer diagnostics. Meer
This book explores various applications of deep learning-oriented diagnosis leading to decision support, while also outlining the future face of medical decision support systems. Meer
Providing a wide variety of technologies for ensuring the safety and dependability of cyber-physical systems (CPS), this book offers a comprehensive introduction to the architecture-centric modeling, analysis, and verification of CPS. Meer
This book addresses the emerging area of cloud computing, providing a comprehensive overview of the research areas, recent work and open research problems. Meer
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Meer
This book blends the principles of cloud computing theory and discussion of emerging technologies in cloud broker systems, enabling users to realise the potential of an integrated broker system for scientific applications and the Internet of Things (IoT). Meer
This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Meer
This book, compiles, presents, and explains the most important meta-heuristic and evolutionary optimization algorithms whose successful performance has been proven in different fields of engineering, and it includes application of these algorithms to important engineering optimization problems. Meer
The book includes insights that reflect the advances in the field of Internet of Things from upcoming researchers and leading academicians across the globe. Meer
This book discusses action-oriented, concise and easy-to-communicate goals and challenges related to quality, reliability, infocomm technology and business operations. Meer
The edited volume contains original papers contributed to 1st International Conference on Smart System, Innovations and Computing (SSIC 2017) by researchers from different countries. Meer
From basic architecture, interconnection, and parallelization to power optimization, this book provides a comprehensive description of emerging multicore systems-on-chip (MCSoCs) hardware and software design. Meer
This book offers readers an essential introduction to the fundamentals of digital image processing. Pursuing a signal processing and algorithmic approach, it makes the fundamentals of digital image processing accessible and easy to learn. Meer
The aim of this book is to establish a basis for resolving the various issues facing modern society by exploring the field of Computational Social Science, which fuses the social and natural sciences. Meer
Covering network designs, discrete convex analysis, facility location and clustering problems, matching games, and parameterized complexity, this book discusses theoretical aspects of combinatorial optimization and graph algorithms. Meer
This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. Meer
This book addresses the topic of fractional-order modeling of nuclear reactors. Approaching neutron transport in the reactor core as anomalous diffusion, specifically subdiffusion, it starts with the development of fractional-order neutron telegraph equations. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books