The book proposes new technologies and discusses innovative solutions to various problems in the field of communication, circuits, and systems, as reflected in high-quality papers presented at International Conference on Communication, Circuits, and Systems (IC3S 2020) held at KIIT, Bhubaneswar, India from 16 – 18 October 2020. Meer
This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. Meer
This book includes high-quality papers presented at the Second International Conference on Data Science and Management (ICDSM 2021), organized by the Gandhi Institute for Education and Technology, Bhubaneswar, from 19 to 20 February 2021. Meer
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. Meer
This book presents an innovative systems approach towards the idea of a smarter world, with advanced and sustainable social infrastructures, facilities and services. Meer
This book presents an innovative systems approach towards the idea of a smarter world, with advanced and sustainable social infrastructures, facilities and services. Meer
Generative adversarial networks (GANs) were introduced by Ian Goodfellow and his co-authors including Yoshua Bengio in 2014, and were to referred by Yann Lecun (Facebook’s AI research director) as “the most interesting idea in the last 10 years in ML. Meer
Generative adversarial networks (GANs) were introduced by Ian Goodfellow and his co-authors including Yoshua Bengio in 2014, and were to referred by Yann Lecun (Facebook’s AI research director) as “the most interesting idea in the last 10 years in ML. Meer
This book analyzes the fundamental issues faced when blockchain technology is applied to real-life applications. These concerns, not only in the realm of computer science, are caused by the nature of technological design. Meer
This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible to cyber-attacks and proposes deep learning-based approaches using artificial neural networks models to achieve a safer and more secured IoT environment. Meer
This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible to cyber-attacks and proposes deep learning-based approaches using artificial neural networks models to achieve a safer and more secured IoT environment. Meer
The book focuses on the research methods of networked control systems via sliding mode. The problems with network disturbances, network induced delay, out-of-sequence and packet loss, and network attacks are studied in detail. Meer
This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. Meer
This book discusses recent research on the stability of various neural networks with constrained signals. It investigates stability problems for delayed dynamical systems where the main purpose of the research is to reduce the conservativeness of the stability criteria. Meer
This book includes high-quality research on various aspects of intelligent interactive multimedia technologies in healthcare services. The topics covered in the book focus on state-of-the-art approaches, methodologies, and systems in the design, development, deployment, and innovative use of multimedia systems, tools, and technologies in healthcare. Meer
This book provides a comprehensive introduction to applying compressive sensing to improve data quality in the context of mobile crowdsensing. It addresses the following main topics: recovering missing data, efficiently collecting data, preserving user privacy, and detecting false data. Meer
This book presents a systematic study of visual pattern discovery, from unsupervised to semi-supervised manner approaches, and from dealing with a single feature to multiple types of features. Meer
This book constitutes the refereed proceedings of the First International Conference on Recent Trends in Image Processing and Pattern Recognition, RTIP2R 2016, held in Bidar, Karnataka, India, in December 2016. Meer
Focused on solving competition-based problems, this book designs, proposes, develops, analyzes and simulates various neural network models depicted in centralized and distributed manners. Meer
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books