Covering network designs, discrete convex analysis, facility location and clustering problems, matching games, and parameterized complexity, this book discusses theoretical aspects of combinatorial optimization and graph algorithms. Meer
The volume contains 69 high quality papers presented at International Conference on Computational Intelligence and Informatics (ICCII 2017). The conference was held during 25-27, September, 2017 at Department of Computer Science and Engineering, JNTUHCEH, Hyderabad, Telangana, India. Meer
Trustworthy Ubiquitous Computing covers aspects of trust in ubiquitous computing environments. The aspects of context, privacy, reliability, usability and user experience related to “emerged and exciting new computing paradigm of Ubiquitous Computing”, includes pervasive, grid, and peer-to-peer computing including sensor networks to provide secure computing and communication services at anytime and anywhere. Meer
Human action analyses and recognition are challenging problems due to large variations in human motion and appearance, camera viewpoint and environment settings. Meer
This book introduces the reader to modern computational and statistical tools for translational epigenomics research. Over the last decade, epigenomics has emerged as a key area of molecular biology, epidemiology and genome medicine. Meer
This book focuses on exploring the use of software fault prediction in building reliable and robust software systems. It is divided into the following chapters: Chapter 1 presents an introduction to the study and also introduces basic concepts of software fault prediction. Meer
IT changes everyday’s life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. Meer
The first compendium on robotic art of its kind, this book explores the integration of robots into human society and our attitudes, fears and hopes in a world shared with autonomous machines. Meer
These proceedings from the 2012 symposium on "Chaos, complexity and leadership" reflect current research results from all branches of Chaos, Complex Systems and their applications in Management. Meer
The rapid evolution of computer science, communication, and information technology has enabled the application of control techniques to systems beyond the possibilities of control theory just a decade ago. Meer
Simulation based on mathematical models plays a major role in computer aided design of integrated circuits (ICs). Decreasing structure sizes, increasing packing densities and driving frequencies require the use of refined mathematical models, and to take into account secondary, parasitic effects. Meer
Over the last thirty years an abundance of papers have been writ ten on adaptive dynamic control systems. Nevertheless, now it may be predicted with confidence that the adaptive mechanics, a new division, new line of inquiry in one of the violently developing fields of cybernetic mechanics, is emerging. Meer
This book presents up-to-date research developments and novel methodologies to solve various stability and control problems of dynamic systems with time delays. Meer
This book provides a comprehensive and in-depth understanding of wireless indoor localization for ubiquitous applications. The past decade has witnessed a flourishing of WiFi-based indoor localization, which has become one of the most popular localization solutions and has attracted considerable attention from both the academic and industrial communities. Meer
This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e. Meer
Deep Learning models are at the core of artificial intelligence research today. It is well known that deep learning techniques are disruptive for Euclidean data, such as images or sequence data, and not immediately applicable to graph-structured data such as text. Meer
Representation learning in heterogeneous graphs (HG) is intended to provide a meaningful vector representation for each node so as to facilitate downstream applications such as link prediction, personalized recommendation, node classification, etc. Meer
This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible to cyber-attacks and proposes deep learning-based approaches using artificial neural networks models to achieve a safer and more secured IoT environment. Meer
This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible to cyber-attacks and proposes deep learning-based approaches using artificial neural networks models to achieve a safer and more secured IoT environment. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books