Imaging for Forensics and Security: From Theory to Practice provides a detailed analysis of new imaging and pattern recognition techniques for the understanding and deployment of biometrics and forensic techniques as practical solutions to increase security. Meer
Imagine yourself as a military officer in a conflict zone trying to identify locations of weapons caches supporting road-side bomb attacks on your country’s troops. Meer
Complex systems are systems that comprise many interacting parts with the ability to generate a new quality of collective behavior through self-organization, e. Meer
Mathematics of Complexity and Dynamical Systems is an authoritative reference to the basic tools and concepts of complexity, systems theory, and dynamical systems from the perspective of pure and applied mathematics. Meer
SpringerBriefs present concise summaries of cutting-edge research and practical applications across a wide spectrum of fields. Featuring compact volumes of 50 to 100 pages (approximately 20,000- 40,000 words), the series covers a range of content from professional to academic. Meer
2 Source Code Availability All of the source code in this volume, and some that is not, is available from the author for $20. The author is also interested in learning of any errors that may be found, though care has been taken in the construction of the modules to minimize the possibility of their occurence. Meer
Source Code Availability All of the source code found in this volume, and some that is not, is available from the author at a nominal fee. The author is interested in learning of any errors that may be found, though care has been taken in the construction of the modules to minimize these. Meer
As part of the NSF's EXPRES project, the authors investigated ways to interchange multi-media documents among diverse systems. Their investigations led to an analysis and implementation of multi-media document format translation in general, and of the ODA standard in particular. Meer
Stata is the most flexible and extensible data analysis package available from a commercial vendor. R is a similarly flexible free and open source package for data analysis, with over 3,000 add-on packages available. Meer
Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Meer
Most physical systems lose or gain stability through bifurcation behavior. This book explains a series of experimentally found bifurcation phenomena by means of the methods of static bifurcation theory. Meer
This volume features key contributions from the International Conference on Pattern Recognition Applications and Methods, (ICPRAM 2012,) held in Vilamoura, Algarve, Portugal from February 6th-8th, 2012. Meer
Semantic Analysis and Understanding of Human Behaviour in Video Streaming investigates the semantic analysis of the human behaviour captured by video streaming, and introduces both theoretical and technological points of view. Meer
A beginner's guide to coding that will teach you everything you need to know to program professionally, from writing your first Python program, to passing your first technical interview. Meer
The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. Meer
This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. Meer
Heavy-tailed probability distributions are an important component in the modeling of many stochastic systems. They are frequently used to accurately model inputs and outputs of computer and data networks and service facilities such as call centers. Meer
Computational Intelligence in Biomedical Imaging is a comprehensive overview of the state-of-the-art computational intelligence research and technologies in biomedical images with emphasis on biomedical decision making. Meer
An Introduction to Quasisymmetric Schur Functions is aimed at researchers and graduate students in algebraic combinatorics. The goal of this monograph is twofold. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books