The book focuses on analysis and design for positive stochastic jump systems. By using multiple linear co-positive Lyapunov function method and linear programming technique, a basic theoretical framework is formed toward the issues of analysis and design for positive stochastic jump systems. Meer
The book will provide:
1) In depth explanation of rough set theory along with examples of the concepts.
2) Detailed discussion on idea of feature selection. Meer
This book addresses the emerging area of cloud computing, providing a comprehensive overview of the research areas, recent work and open research problems. Meer
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Meer
This book blends the principles of cloud computing theory and discussion of emerging technologies in cloud broker systems, enabling users to realise the potential of an integrated broker system for scientific applications and the Internet of Things (IoT). Meer
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers. Meer
This book constitutes the proceedings of the Third BenchCouncil International Symposium on Intelligent Computers, Algorithms, and Applications, IC 2023, which took place in Sanya, China, in December 2023. Meer
This book discusses action-oriented, concise and easy-to-communicate goals and challenges related to quality, reliability, infocomm technology and business operations. Meer
This book presents high-quality research papers presented at the 5th International Conference on Sustainable and Innovative Solutions for Current Challenges in Engineering and Technology (ICSISCET 2023) held at Madhav Institute of Technology & Science (MITS), Gwalior, India, during October 21–22, 2023. Meer
This book presents high-quality research papers presented at the 5th International Conference on Sustainable and Innovative Solutions for Current Challenges in Engineering and Technology (ICSISCET 2023) held at Madhav Institute of Technology & Science (MITS), Gwalior, India, during October 21–22, 2023. Meer
Dieses Buch diskutiert die Verwendung von Technologie, Data Science und Open Data, um das Netto-Null-Emissionsziel des Pariser Abkommens zum Klimawandel zu erreichen. Meer
The edited volume contains original papers contributed to 1st International Conference on Smart System, Innovations and Computing (SSIC 2017) by researchers from different countries. Meer
This book provides a systematic study on the security of deep learning. With its powerful learning ability, deep learning is widely used in CV, FL, GNN, RL, and other scenarios. Meer
This book covers a comprehensive approach to the development and application of a suite of novel algorithms for practical approximate knowledge-based inference. Meer
This book constitutes the refereed proceedings of the Second Summit on Music Intelligence, SOMI 2023, held in Beijing, China, during October 28–30, 2023. Meer
From basic architecture, interconnection, and parallelization to power optimization, this book provides a comprehensive description of emerging multicore systems-on-chip (MCSoCs) hardware and software design. Meer
This 2-volume set CCIS 2014 and CCIS 2015 constitutes the post-conference proceedings of the First International Conference on Applied Intelligence, ICAI 2023, held in Nanning, China, December 8–12, 2023. Meer
This two-volume set, CCIS 2017 and 2018 constitutes the 8th International Conference, on Data Mining and Big Data, DMBD 2023, held in Sanya, China, in December 2023. Meer
This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. Meer
Unsupervised domain adaptation (UDA) is a challenging problem in machine learning where the model is trained on a source domain with labeled data and tested on a target domain with unlabeled data. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books