Account
Orders
Advanced search
This book offers an essential guide to IoT Security, Smart Cities, IoT Applications, etc. In addition, it presents a structured introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and...
This book presents the proceedings of the 4th International Conference on Advanced Intelligent Systems and Informatics 2018 (AISI2018), which took place in Cairo, Egypt from September 1 to 3, 2018.This international and interdisciplinary conference, which highlighted...
This book provides a collection of high-quality research works that address broad challenges in both theoretical and applied aspects of dynamic wireless sensor networks (WSNs) for intelligent and smart applications in a variety of environments. It presents the most...
This book presents the refereed proceedings of the third International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2018, held in Cairo, Egypt, on February 22–24, 2018, and organized by the Scientific Research Group in Egypt (SRGE). The...
This book highlights practical quantum key distribution systems and research on the implementations of next-generation quantum communication, as well as photonic quantum device technologies. It discusses how the advances in quantum computing and quantum physics have...
This book gathers the proceedings of the 3rd International Conference on Advanced Intelligent Systems and Informatics 2017 (AISI2017), which took place in Cairo, Egypt from September 9 to 11, 2017.This international and interdisciplinary conference, which highlighted...
The conference topics address different theoretical and practical aspects, and implementing solutions for intelligent systems and informatics disciplines including bioinformatics, computer science, medical informatics, biology, social studies, as well as robotics...
The success of a BCI system depends as much on the system itself as on the user’s ability to produce distinctive EEG activity. BCI systems can be divided into two groups according to the placement of the electrodes used to detect and measure neurons firing in the brain....
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers