Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This book covers detector architectures, feature learning, proposal generation, sampling strategies, and other issues that affect detection performance.
This book is a practical guide to finding and delivering energy savings opportunities in transport operations for professional energy managers and energy auditors.
Mathematical modelling and simulation are viewed as viable alternatives to performing experiments in medicine and biology, and are discussed in this book. The book also explores the probabilistic computational deep learning model for cancer classification and prediction.
This book provides an overview of the latest research results and activities in industrial embedded AI technologies and applications, based on close cooperation between three large-scale ECSEL JU projects, AI4DI, ANDANTE, and TEMPO.
This monograph contains the best practice for solving problems of quantum cryptanalysis to improve cyber security and resilience of the digital economy. The book discusses well-known and author's software implementations of promising quantum Shor algorithms, Grover, Simon et al.
This book describes the methods of signal processing used in the non-destructive diagnostics of mechanical and electrical properties of high-voltage electrical machines.
This book stands as the full body of scholarly work on western theories of social sciences. This book intends to answer the broad and major questions of theories, methods, and the international organization studies in social sciences, particularly in sociology and to provide the basic concepts of social theories.
This book provides a structured presentation of convolutional neural network enabled IoT applications in vision, speech, and natural language processing.
This book explores many fundamental topics in a basic and easy-to-understand manner. The content has been continually updated and revised through new editions and by external reviewers throughout the years.
This book overviews the latest research results and activities in industrial artificial intelligence technologies and applications based on the innovative research, developments and ideas generated by the ECSEL JU AI4DI, ANDANTE and TEMPO projects.
This book gives insights into the latest developments of applications of AI in biomedicine, including disease diagnostics, pharmaceutical processing, patient care and monitoring, biomedical information, and biomedical research.
This book provides every level of decision-maker with tools and best practices for reducing the risk of and from electricity loss due to external forces.
This book covers a wide range of challenges, technologies and state of the art for the design, development and realization of smart embedded systems and their applications.
This book reports research advances in the area of deep learning, IoT and urban computing, and describes new insights based on deep learning and IoT for urban computing.
This book covers all areas of smart antennas, electromagnetic interference, and microwave antennas for wireless communications. Smart antennas or adaptive antennas are multi-antenna components on one or both sides of a radio communication connection, combined with advanced signal processing algorithms. They've evolved into a critical technology for third-generation and beyond mobile communication systems to meet their lofty capacity and performance targets. It seems that a significant capacity gain is achievable, particularly if they are employed on both sides of the connection. There are several essential characteristics of these systems that need scientific and technical investigation. Included in the book are beamforming, massive MIMO, network MIMO, mmwave transmission, compressive sensing, MIMO radar, sensor networks, vehicle-to-vehicle communication, location, and machine learning.
This book is an attempt to unveil the hidden potential of the enormous amount of health information and technology. This book is written with the intent to uncover the stakes and possibilities involved in realizing personalized health-care services through efficient and effective deep learning algorithms.
This book explores many essential topics in electrical fundamentals in a basic and easy-to-understand manner.
This book presents what you need to know to really implement continuous improvement in companies or other organizations.
This book brings together researchers in the field of big data analytics and intelligent systems for cyber threat intelligence CTI and key data to advance the mission of anticipating, prohibiting, preventing, preparing, and responding to internal security.
Digital forensics is the science of detecting evidence from digital media like a computer, smartphone, server, or network. It provides the forensic team with the most beneficial methods to solve confused digital-related cases. AI and blockchain can be applied to solve online predatory chat cases and photo forensics cases, provide network service evidence, custody of digital files in forensic medicine, and identify roots of data scavenging. The increased use of PCs and extensive use of internet access, have meant easy availability of hacking tools. Over the past two decades, improvements in the information technology landscape have made the collection, preservation, and analysis of digital evidence extremely important. The traditional tools for solving cybercrimes and preparing court cases are making investigations difficult. We can use AI and blockchain design frameworks to make the digital forensic process efficient and straightforward. AI features help determine the contents of a picture, detect spam email messages and recognize swatches of hard drives that could contain suspicious files. Blockchain-based lawful evidence management schemes can supervise the entire evidence flow of all of the court data.This book provides a wide-ranging overview of how AI and blockchain can be used to solve problems in digital forensics using advanced tools and applications available on the market.
The book is an extensive collection of state-of-the-art studies on advanced control paradigms for complex energy systems, with emphasis on the optimization and management of the high penetration of distributed energy resources into power distribution networks.
5G, the emerging technology in mobile communication, is expected to deliver an important and decisive impact on several of the UN's Sustainable Development Goals where universal accessibility to ICTs remains a serious concern. However, cyber security has emerged as a serious challenge, not least because of the increased accessibility and broader usage with associated vulnerability. Developing countries have additional challenges associated with both the expected faster build-up of accessibility and lack of qualified competencies within cyber security. Discussion of these challenges is the overall theme and motivation for this book.Technical topics discussed in the book include:5G in rural networksCritical infrastructuresOpen RANProtection of privacyCybersecurity and machine learningCybersecurity and disaster monitoring
Many scientific and real-world problems that occur in science, engineering, and medicine can be represented in differential equations. There is a vital role for differential equations in studying the behavior of different types of real-world problems. Thus, it becomes crucial to know the existence and uniqueness properties of differential equations and various methods of finding differential equation solutions in explicit form. It is also essential to know different kinds of differential equations in terms of eigenvalues, termed eigenvalue problems, and some special functions used in finding the solution to differential equations. The study of nonlinear problems also plays a significant role in different real-world situations. There is a necessity to know the behavior of solutions of nonlinear differential equations. Still, there are very few forms of differential equations whose solution can be found in explicit form. For the differential equations whose solutions cannot be found in explicit form, one has to study the properties of solutions of the given differential equation to guess an approximate solution of it. This book aims to introduce all the necessary topics of differential equations in one book so that laymen can easily understand the subject and apply it in their research areas. The novel approach used in this book is the introduction of different analytical methods for finding the solution of differential equations with sufficient theorems, corollaries, and examples, and the geometrical interpretations in each topic.This textbook is intended to study the theory and methods of finding the explicit solutions to differential equations, wherever possible, and in the absence of finding explicit solutions, it is intended to study the properties of solutions to the given differential equations. This book is based on syllabi of the theory of differential equations prescribed for postgraduate students of mathematics and applied mathematics in different institutions and universities of India and abroad. This book will be helpful for competitive examinations as well.
This book is designed especially for students of all levels, and can serve as a fundamental resource for advanced level studies not only in mathematics but also in various fields like engineering, interior design, architecture, etc. It includes numerical problems and problems of construction as well as practical problems.
This edited book comprises chapters that describe the IoT, machine learning, and blockchain technologies for renewable energy and modern hybrid power systems with simulation examples and case studies.After reading this book, users will understand recent technologies such as IoT, machine learning techniques, and blockchain technologies and the application of these technologies to renewable energy resources and modern hybrid power systems through simulation examples and case studies.
Industrial Energy Systems Handbook is a supplementary reading resource for candidates undertaking the Association of Energy Engineers (AEE) Certified Industrial Energy Professional (CIEP) program.
Sir Isaac Newton, one of the greatest scientists and mathematicians of all time, introduced the notion of a vector to define the existence of gravitational forces, the motion of the planets around the sun, and the motion of the moon around the earth. Vector calculus is a fundamental scientific tool that allows us to investigate the origins and evolution of space and time, as well as the origins of gravity, electromagnetism, and nuclear forces. Vector calculus is an essential language of mathematical physics, and plays a vital role in differential geometry and studies related to partial differential equations widely used in physics, engineering, fluid flow, electromagnetic fields, and other disciplines. Vector calculus represents physical quantities in two or three-dimensional space, as well as the variations in these quantities.The machinery of differential geometry, of which vector calculus is a subset, is used to understand most of the analytic results in a more general form. Many topics in the physical sciences can be mathematically studied using vector calculus techniques.This book is designed under the assumption that the readers have no prior knowledge of vector calculus. It begins with an introduction to vectors and scalars, and also covers scalar and vector products, vector differentiation and integrals, Gauss's theorem, Stokes's theorem, and Green's theorem. The MATLAB programming is given in the last chapter.This book includes many illustrations, solved examples, practice examples, and multiple-choice questions.
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. An appendix includes a review of probability theory. Illustrations and graphics will help the reader understand the theory.
This book explores the evolution from current 5G networks towards the future 6G networks from a service, air interface, and network perspective, thereby laying out a vision for 6G networks.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.