Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches introduces engineers and researchers to the field of nonlinear adaptive system identification. Meer
Abstract Biological vision is a rather fascinating domain of research. Scientists of various origins like biology, medicine, neurophysiology, engineering, math ematics, etc. Meer
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. Meer
Research and development on optical wavelength-division multiplexing (WDM) networks have matured considerably. While optics and electronics should be used appropriately for transmission and switching hardware, note that "intelligence'' in any network comes from "software,'' for network control, management, signaling, traffic engineering, network planning, etc. Meer
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Meer
Semantics, Web services, and Web processes promise better re-use, universal interoperability and integration. Semantics has been recognized as the primary tool to address the challenges of a broad spectrum of heterogeneity and for improving automation through machine understandable descriptions. Meer
The two-volume Advances in Information Systems Development: Bridging the Gap between Academia and Industry constitutes the collected proceedings of the Fourteenth International Conference on Information Systems Development: Methods and Tools, Theory and Practice – ISD’2005 Conference. Meer
This book provides theoretical and practical knowledge for develop ment of algorithms that infer linear and nonlinear models. It offers a methodology for inductive learning of polynomial neural network mod els from data. Meer
This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Meer
Presents original method of enhanced ant colony optimization in feature selection, based on mathematical experiments and modelling.
Provides a theoretical concept in iris features searching and detection as part of feature extraction process. Meer
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Meer
There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. Meer
There are two groups of researchers who are interested in designing network protocols and who cannot (yet) effectively communicate with one another c- cerning these protocols. Meer
In 1978, when the book Living Systems was published, it contained the prediction that the sciences that were concerned with the biological and social sciences would, in the future, be stated as rigorously as the “hard sciences” that study such nonliving phenomena as temperature, distance, and the interaction of chemical elements. Meer
Although rigidity has been studied since the time of Lagrange (1788) and Maxwell (1864), it is only in the last twenty-five years that it has begun to find applications in the basic sciences. Meer
Biometrics in dermatology is an essential tool where data evaluation results in valid interpretations. This book will be the first in this area. One part of the book will describe principal aspects of dermatological research focussing on practical advice. Meer
1. MOTIVATION In many physical situations, a plant model is often provided with a qualitative or quantitative measure of associated model uncertainties. Meer
The volume is based on the papers that were presented at the Interna tional Conference Model-Based Reasoning in Scientific Discovery (MBR'98), held at the Collegio Ghislieri, University of Pavia, Pavia, Italy, in December 1998. Meer
This book is a result of the ISD'99, Eight International Conference on Infonnation Systems Development-Methods and Tools, Theory, and Practice held August 11-13, 1999 in Boise, Idaho, USA. Meer
This book introduces the fundamental concepts and practical simulation te- niques for modeling different aspects of operating systems to study their g- eral behavior and their performance. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books