The book focuses on one of the key issues in document image processing – graphical symbol recognition, which is a sub-field of the larger research domain of pattern recognition. Meer
This book focuses on the applications of Equivalent-Small-Parameter Method (ESPM) in solving the steady-state periodic solutions, as well as stability analysis, of kinds of open-loop or closed-loop operated DC/DC converters, such as PWM, quasi-resonant and resonant ones. Meer
This book investigates the permutation polynomial (PP) based interleavers for turbo codes, including all the main theoretical and practical findings related to topics such as full coefficient conditions for PPs up to fifth; the number of all true different PPs up to fifth degree; the number of true different PPs under Zhao and Fan sufficient conditions, for any degree (with direct formulas or with a simple algorithm); parallel decoding of turbo codes using PP interleavers by butterfly networks; upper bounds of the minimum distance for turbo codes with PP interleavers; specific methods to design and find PP interleavers with good bit/frame error rate (BER/FER) performance. Meer
This is the second volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in the field. Meer
This book helps readers understand the mathematics of machine learning, and apply them in different situations. It is divided into two basic parts, the first of which introduces readers to the theory of linear algebra, probability, and data distributions and it’s applications to machine learning. Meer
This book examines two main topics, namely, Wireless Networking and Mobile Data Management. It is designed around a course the author began teaching to senior undergraduate and master’s students at the Department of Computer Science & Engineering of the Indian Institute of Technology Kanpur. Meer
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Meer
This book blends the principles of cloud computing theory and discussion of emerging technologies in cloud broker systems, enabling users to realise the potential of an integrated broker system for scientific applications and the Internet of Things (IoT). Meer
This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Meer
This book, compiles, presents, and explains the most important meta-heuristic and evolutionary optimization algorithms whose successful performance has been proven in different fields of engineering, and it includes application of these algorithms to important engineering optimization problems. Meer
Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Meer
This book demonstrates that the concept of an instruction sequence offers a novel and useful viewpoint on issues relating to diverse subjects in computer science. Meer
Disaster management is a process or strategy that is implemented when any type of catastrophic event takes place. The process may be initiated when anything threatens to disrupt normal operations or puts the lives of human beings at risk. Meer
System on chips designs have evolved from fairly simple unicore, single memory designs to complex heterogeneous multicore SoC architectures consisting of a large number of IP blocks on the same silicon. Meer
Society heavily depends on infrastructure systems, such as road-traffic networks, water networks, electricity networks, etc. Infrastructure systems are hereby considered to be large-scale, networked systems, that almost everybody uses on a daily basis, and that are so vital that their incapacity or destruction would have a debilitating impact on the defense or economic security and functioning of society. Meer
This book reveals how open innovation utilizes the developing circle of business models to establish new ones that define a unique link between technology and markets, focusing on how to develop and maintain successful business models. Meer
Invariant, or coordinate-free methods provide a natural framework for many geometric questions. Invariant Methods in Discrete and Computational Geometry provides a basic introduction to several aspects of invariant theory, including the supersymmetric algebra, the Grassmann-Cayler algebra, and Chow forms. Meer
Providing a wide variety of technologies for ensuring the safety and dependability of cyber-physical systems (CPS), this book offers a comprehensive introduction to the architecture-centric modeling, analysis, and verification of CPS. Meer
IT securiteers - The human and technical dimension working for the organisation.
Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. Meer
and processes which are exclusive to humans in their encoding, storing, decoding and retrieving spatial knowledge for various tasks. The authors present and discuss connectionist models of cognitive maps which are based on local representation, versus models which are based on distributed representation, as well as connectionist models concerning language and spatial relations. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books