This book covers the topics on cyber security in IoT systems used in different verticals such as agriculture, health, homes, transportation within the context of smart cities. Meer
This book offers a clear understanding of the concept of context-aware machine learning including an automated rule-based framework within the broad area of data science and analytics, particularly, with the aim of data-driven intelligent decision making. Meer
This book constitutes the 15th edition of the annual Multi-Agent Programming Contest, MAPC 2020.
It gives an overview of the competition, describes the current scenario. Meer
This book constitutes the refereed proceedings of the 4th International Workshop on Machine Learning for Medical Reconstruction, MLMIR 2021, held in conjunction with MICCAI 2021, in October 2021. Meer
This book provides a comprehensive view of cyber operations, analysis and targeting, including operational examples viewed through a lens of conceptual models available in current technical and policy literature. Meer
This book constitutes the thoroughly refereed post-conference proceedings of the 25th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2022, held as a virtual event in June 2022 (due to the Covid-19 pandemic). Meer
This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Meer
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. Meer
This book covers the work of Erik W. Aslaksen who continues to develop the view of society and its evolution published in earlier work – The Social Bond (Springer 2018), The Stability of Society (Springer 2020), and Measures of Social Evolution (Springer 2021), bringing together core material of that work with the results of recent investigations in order to present the evolution of society as an integrated and continuous story leading right up to the present time. Meer
This book covers the work of Erik W. Aslaksen who continues to develop the view of society and its evolution published in earlier work – The Social Bond (Springer 2018), The Stability of Society (Springer 2020), and Measures of Social Evolution (Springer 2021), bringing together core material of that work with the results of recent investigations in order to present the evolution of society as an integrated and continuous story leading right up to the present time. Meer
This book focuses on numerous examples of tasks represented by c-e structure. Cause–effect (c-e) structures are dynamic objects devised for algebraic and graphic description of realistic tasks. Meer
This book constitutes the thoroughly
refereed post-conference proceedings of the 10th International Symposium on
Trustworthy Global Computing, TGC 2015, held in Madrid, Spain, in August/September
2015. Meer
This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and privacy for MHNs. Meer
This text reviews the field of digital image processing from the different perspectives offered by the separate domains of signal processing and pattern recognition. Meer
This text presents an overview of smart information systems for both the private and public sector, highlighting the research questions that can be studied by applying computational intelligence. Meer
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. Meer
This book represents the combined peer-reviewed proceedings of the ninth International Symposium on Intelligent Distributed Computing – IDC’2015, of the Workshop on Cyber Security and Resilience of Large-Scale Systems – WSRL’2015, and of the International Workshop on Future Internet and Smart Networks – FI&SN’2015. Meer
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Homes and Health Telematics, ICOST 2014, held in Denver, CO, USA in June 2014. Meer
Intelligent Control considers non-traditional modelling and control approaches to nonlinear systems. Fuzzy logic, neural networks and evolutionary computing techniques are the main tools used. Meer
Nature-inspired algorithms such as cuckoo search and firefly algorithm have become popular and widely used in recent years in many applications. These algorithms are flexible, efficient and easy to implement. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books