This book gathers the proceedings of the 6th International Conference on Frontier Computing, held in Osaka, Japan on July 12–14, 2017, and provides comprehensive coverage of the latest advances and trends in information technology, science and engineering. Meer
This book belongs to the subject of control and systems theory. It studies a novel data-driven framework for the design and analysis of iterative learning control (ILC) for nonlinear discrete-time systems. Meer
This book belongs to the subject of control and systems theory. It studies a novel data-driven framework for the design and analysis of iterative learning control (ILC) for nonlinear discrete-time systems. Meer
This book explores the emerging concept of cultural DNA, considering its application across different fields and examining commonalities in approach. It approaches the subject from four different perspectives, in which the topics include theories, analysis and synthesis of cultural DNA artefacts. Meer
This book highlights technical advances in knowledge management and their applications across a diverse range of domains. It explores the applications of knowledge computing methodologies in image processing, pattern recognition, health care and industrial contexts. Meer
This book is inspired by the development of distributed model predictive control of networked systems to save computation and communication sources. The significant new contribution is to show how to design efficient DMPCs that can be coordinated asynchronously with the increasing effectiveness of the event-triggering mechanism and how to improve the event-triggered DMPC for different requirements improvement of control performance, extension to interconnected networked systems, etc. Meer
This book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. Meer
This book offers a broad overview of mobile communications and its databases, focusing on the processes and methods used in mobile communication networks. Meer
This volume in the series, Translational Bioinformatics, provides an up-to-date overview of genomic approaches to asthma. By applying unbiased “-omics” combined with disease-focused and hypothesis-driven approaches, it enhances readers’ understanding of the asthma endotype. Meer
This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Meer
How did the Commodore 64 conquer the hearts of millions and become a platform people still actively develop for even today? What made it so special?
This book will appeal to both those who like tinkering with old technology as a hobby and nostalgic readers who simply want to enjoy a trip down memory lane. Meer
This book presents the latest developments and breakthroughs in fuzzy theory and performance prediction of queuing and reliability models by using the stochastic modeling and optimization theory. Meer
This two-volume set (CCIS 848 and CCIS 849) constitutes the thoroughly refereed proceedings of the 5th International Conference Geo-Spatial Knowledge and Intelligence, GSKI 2017, held in Chiang Mai, Thailand, in December 2018. Meer
This two-volume set (CCIS 848 and CCIS 849) constitutes the thoroughly refereed proceedings of the 5th International Conference Geo-Spatial Knowledge and Intelligence, GSKI 2017, held in Chiang Mai, Thailand, in December 2018. Meer
The book covers the most recent developments in machine learning, signal analysis, and their applications. It covers the topics of machine intelligence such as: deep learning, soft computing approaches, support vector machines (SVMs), least square SVMs (LSSVMs) and their variants; and covers the topics of signal analysis such as: biomedical signals including electroencephalogram (EEG), magnetoencephalography (MEG), electrocardiogram (ECG) and electromyogram (EMG) as well as other signals such as speech signals, communication signals, vibration signals, image, and video. Meer
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Meer
This book includes selected papers submitted to the ICADABAI-2017 conference, offering an overview of the new methodologies and presenting innovative applications that are of interest to both academicians and practitioners working in the area of analytics. Meer
This book presents high-quality papers from an international forum for research on computational approaches to learning. It includes current research and findings from various research labs, universities and institutions that may lead to development of marketable products. Meer
This book is on the iterative learning control (ILC) with focus on the design and implementation. We approach the ILC design based on the frequency domain analysis and address the ILC implementation based on the sampled data methods. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books