for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
With the rising cybercrimes, a well-trained cybersecurity workforce in an organization has become a necessity. This book aims to provide substantial theoretical knowhow... Læs mere
Bemærk: Kan ikke leveres før jul.
Phishing Detection using Content Based Image Classification explores Phishing detection using computer vision through CNN, transfer learning... Læs mere
Bemærk: Kan ikke leveres før jul.
This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and... Læs mere
Bemærk: Kan ikke leveres før jul.
Searching for a needle in a haystack is an important task in several contexts of data analysis and decision-making.... Læs mere
Bemærk: Kan ikke leveres før jul.
This book provides a reference for the applications of mathematical modeling using intelligent techniques in various unique... Læs mere
Bemærk: Kan ikke leveres før jul.
This book deals with the advancements made in the verticals of design approach using emerging technologies in artificial intelligence. It intends to... Læs mere
Bemærk: Kan ikke leveres før jul.
Entropy Randomization in Machine Learning presents a new approach to machine learning - entropy randomization - to obtain optimal solutions under uncertainty (uncertain data and models of the objects under study).
Bemærk: Kan ikke leveres før jul.
The book discusses recent advances in object detection and recognition using deep learning methods, which have achieved great... Læs mere
Bemærk: Kan ikke leveres før jul.
Energy Harvesting: Enabling IoT Transformations gives an insight into the emergence of energy harvesting technology and its integration with IoT based... Læs mere
Bemærk: Kan ikke leveres før jul.
Dealing with artificial intelligence, this book delineates AI’s role in model... Læs mere
Bemærk: Kan ikke leveres før jul.
This book provides detailed descriptions of downlink non-orthogonal multiple transmissions and uplink non-orthogonal multiple access (NOMA) from the aspects of majorly used 5G New Radio scenarios and system performance.
Bemærk: Kan ikke leveres før jul.
This book provides a comprehensive coverage of major channel codes adopted since the 3rd generation of mobile communication. Modulation schemes suitable for 5G mobile communications are also described based on key New Radio application scenarios and performance requirements.