Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation.
Provides a review of technologies, techniques and systems for trusted, ethical, and secure AI in manufacturing. Topics covered include systems and technologies for industrial data reliability, responsible and transparent AI systems, human centred manufacturing systems, cyber-defence in AI systems, and simulated reality systems.
Questions the varied set of organisational forms collected under the label of 'collaborative' or 'sharing' economy - ranging from grassroots peer-to-peer solidarity initiatives to corporate owned platforms - from the perspective of what is known as the European social values: respect for human dignity and human rights.
Discusses decentralised wastewater treatment and the role of nature-based solutions within the context of the twenty-partner international INNOQUA project. Design and operation principles are outlined, together with performance data and practical feedback from pilot and demonstration facilities situated in eleven countries.
Being an inter-disciplinary subject, Signal Processing has application in almost all scientific fields. Applied Signal Processing links between the analogue and digital signal processing domains.
Offers a comprehensive guide to sparsity methods for systems and control, from standard sparsity methods in finite-dimensional vector spaces to optimal control methods in infinite-dimensional function spaces.The primary objective of this book is to show how to use sparsity methods for several engineering problems.
Presents the findings and results of the Bots2ReC project, and should be useful for Construction and Robotics Engineers, as well as graduate level students and researchers active in these fields.
Presents integrated (cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, the book introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies.
Introduces a set of novel risk assessment techniques and their role in the IoT security risk management process. Specifically, the book presents architectures and platforms for end-to-end security, including their implementation based on the edge/fog computing paradigm.
The SpiNNaker project has delivered the world's largest neuromorphic computing platform incorporating over a million ARM mobile phone processors and capable of modelling spiking neural networks of the scale of a mouse brain in biological real time. This books tells the story of the origins of the machine, its development and its deployment.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.