Account
Orders
Advanced search
AI Applications to Communications and Information Technologies Apply the technology of the future to networking and communications. Artificial intelligence, which enables computers or computer-controlled systems to perform tasks which ordinarily require human-like...
Accelerators for Convolutional Neural Networks Comprehensive and thorough resource exploring different types of convolutional neural networks and complementary acceleratorsAccelerators for Convolutional Neural Networks provides basic deep learning knowledge and...
Metaverse Communication and Computing Networks Understand the future of the Internet with this wide-ranging analysis “Metaverse” is the term for applications that allow users to assume digital avatars to interact with other humans and software functions in a...
CYBERNETICAL INTELLIGENCE Highly comprehensive, detailed, and up-to-date overview of artificial intelligence and cybernetics, with practical examples and supplementary learning resources Cybernetical Intelligence: Engineering Cybernetics with Machine Intelligence is a...
Attribute-based Encryption (ABE) Enables readers to understand applications of attribute-based encryption schemes in cloud computing with the support of blockchain technology With a focus on blockchain technology,Attribute-based Encryption (ABE) provides insight into...
Blockchains Empowering Technologies and Industrial Applications A comprehensive guide to the most recent developments in blockchains in theoretical and industrial perspectives Originally introduced as a method to keep track of Bitcoin transactions over a peer-to-peer...
QUANTUM COMPUTING A helpful introduction to all aspects of quantum computing Quantum computing is a field combining quantum mechanics—the physical science of nature at the scale of atoms and subatomic particles—and information science. Where ordinary computing uses...
Handbook of Human-Machine Systems Insightful and cutting-edge discussions of recent developments in human-machine systems InHandbook of Human-Machine Systems, a team of distinguished researchers delivers a comprehensive exploration of human-machine systems (HMS)...
Deep Reinforcement Learning for Wireless Communications and Networking Comprehensive guide toDeep Reinforcement Learning (DRL) as applied to wireless communication systemsDeep Reinforcement Learning for Wireless Communications and Networking presents an overview of the...
Parallel Population andParallel Human Proposes a new paradigm to investigate an individual’s cognitive deliberation in dynamic human-machine interactions Today, intelligent machines enable people to interact remotely with friends, family, romantic partners, colleagues,...
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques...
Deep Learning Approaches for Security Threats in IoT Environments An expert discussion of the application of deep learning methods in the IoT security environment InDeep Learning Approaches for Security Threats in IoT Environments, a team of distinguished cybersecurity...
Methods and Techniques in Deep Learning Introduces multiple state-of-the-art deep learning architectures for mmWave radar in a variety of advanced applicationsMethods and Techniques in Deep Learning: Advancements in mmWave Radar Solutions provides a timely and...
Zeroing Neural Networks Describes the theoretical and practical aspects of finite-time ZNN methods for solving an array of computational problems Zeroing Neural Networks (ZNN) have become essential tools for solving discretized sensor-driven time-varying matrix problems...
CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMS Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical...
AI AND MACHINE LEARNING FOR NETWORK AND SECURITY MANAGEMENT Extensive Resource for Understanding Key Tasks of Network and Security ManagementAI and Machine Learning for Network and Security Management covers a range of key topics of network automation for network and...
Explore the cloud-native paradigm for event-driven and service-oriented applications In Cloud-Native Computing: How to Design, Develop, and Secure Microservices and Event-Driven Applications, a team of distinguished professionals delivers a comprehensive and insightful...
SECURITY TECHNOLOGIES AND SOCIAL IMPLICATIONS Explains how the latest technologies can advance policing and security, identify threats, and defend citizens from crime and terrorism Security Technologies and Social Implications focuses on the development and application...
PROGRAMMING AND GUI FUNDAMENTALS Discover the foundations of TCL programming and GUI development Programming and GUI Fundamentals: Tcl-Tk for Electronic Design Automation (EDA), delivers a comprehensive exploration of the major design challenges and potential present in...
IoT-enabled Unobtrusive Surveillance Systems for Smart Campus Safety Enables readers to understand a broad area of state-of-the-art research in physicalIoT-enabled securityIoT-enabled Unobtrusive Surveillance Systems for Smart Campus Safety describes new techniques in...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers