Fault-Tolerant Process Control focuses on the development of general, yet practical, methods for the design of advanced fault-tolerant control systems; these ensure an efficient fault detection and a timely response to enhance fault recovery, prevent faults from propagating or developing into total failures, and reduce the risk of safety hazards. Meer
This Guide to OCR for Arabic Scripts is the first book of its kind, specifically devoted to this emerging field. Topics and features: contains contributions from the leading researchers in the field; with a Foreword by Professor Bente Maegaard of the University of Copenhagen; presents a detailed overview of Arabic character recognition technology, covering a range of different aspects of pre-processing and feature extraction; reviews a broad selection of varying approaches, including HMM-based methods and a recognition system based on multidimensional recurrent neural networks; examines the evaluation of Arabic script recognition systems, discussing data collection and annotation, benchmarking strategies, and handwriting recognition competitions; describes numerous applications of Arabic script recognition technology, from historical Arabic manuscripts to online Arabic recognition. Meer
Canadian Semantic Web is an edited volume based on the first Canadian Web Working Symposium, June 2006, in Quebec, Canada. This volume includes but is not limited to the following popular topics: "Trust, Privacy, Security on the Semantic Web," "Semantic Grid and Semantic Grid Services" and "Semantic Web Mining. Meer
This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Meer
Multi-Modal User Interactions in Controlled Environments investigates the capture and analysis of user’s multimodal behavior (mainly eye gaze, eye fixation, eye blink and body movements) within a real controlled environment (controlled-supermarket, personal environment) in order to adapt the response of the computer/environment to the user. Meer
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Meer
Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Meer
This book is compiled of selected proceedings from the "Landscapes" Conference held at Turku University, Finland, in July 2005. The themes chosen for the conference – philosophy, ethics and sociological aspects, culture and education; social aspects; politics and regulation; economics and work; technology and emerging technologies – represent many of the perspectives from which to view this landscape. Meer
In the last decade, ontologies have received much attention within computer science and related disciplines, most often as the semantic web. Ontology Learning and Population from Text: Algorithms, Evaluation and Applications discusses ontologies for the semantic web, as well as knowledge management, information retrieval, text clustering and classification, as well as natural language processing. Meer
Mobile context-awareness is a popular research trend in the field of ubiquitous computing. Advances in mobile device sensory hardware and the rise of ‘virtual’ sensors such as web application programming interfaces (APIs) mean that the mobile user is exposed to a vast range of data that can be used for new advanced applications. Meer
Nonlinear Stochastic Processes addresses the frequently-encountered problem of incomplete information. The causes of this problem considered here include: missing measurements; sensor delays and saturation; quantization effects; and signal sampling. Meer
Comparative E-Government examines the impact of information and communication technology (ICT) on governments throughout the world. It focuses on the adoption of e-government both by comparing different countries, and by focusing on individual countries and the success and challenges that they have faced. Meer
Most physical systems lose or gain stability through bifurcation behavior. This book explains a series of experimentally found bifurcation phenomena by means of the methods of static bifurcation theory. Meer
Do-All Computing for Distributed Systems: Cooperation in the Presence of Adversity studies algorithmic issues associated with cooperative execution of multiple independent tasks by distributed computing agents including partitionable networks. Meer
Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal. Meer
Linear Genetic Programming presents a variant of genetic programming (GP) that evolves imperative computer programs as linear sequences of instructions, in contrast to the more traditional functional expressions or syntax trees. Meer
This volume provides an overview of multimedia data mining and knowledge discovery and discusses the variety of hot topics in multimedia data mining research. Meer
Image processing is concerned with the analysis and manipulation of images by computer. Providing a thorough treatment of image processing with an emphasis on those aspects most used in computer graphics, the authors concentrate on describing and analyzing the underlying concepts rather than on presenting algorithms or pseudocode. Meer
Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. Meer
With 11 invited submissions from leading researchers and teams of researchers sharing one common characteristic ? all have worked with Dr. Judith Bishop during her long and continuing career as a leader in computer science education and research ? Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books