Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book presents best selected papers presented at the International Conference on Evolving Technologies for Computing, Communication and Smart World (ETCCS 2020) held on 31 January–1 February 2020 at C-DAC, Noida, India.
Bemærk: Kan ikke leveres før jul.
This book presents high-quality research papers presented at the... Læs mere
Bemærk: Kan ikke leveres før jul.
It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security... Læs mere
Bemærk: Kan ikke leveres før jul.
This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics.
Bemærk: Kan ikke leveres før jul.
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020.
Bemærk: Kan ikke leveres før jul.
Subsequently, to enhance the readability of this book, the authors also include real-time problems in RFIC designing, case studies from experimental results, and clearly demarking design guidelines for the 5G communication ICs designing.
Bemærk: Kan ikke leveres før jul.
The book discusses efficiency and robustness of wireless network as a platform for communication and data transmission and also discusses... Læs mere
Bemærk: Kan ikke leveres før jul.
This book focuses on privacy and security concerns in big data and differentiates between privacy and security and privacy requirements in big data.