The use of mathematical methods in the development of software is essential when reliable systems are sought; in particular they are now strongly recommended by the official norms adopted in the production of critical software. Meer
Techniques of vision-based motion analysis aim to detect, track, identify, and generally understand the behavior of objects in image sequences. With the growth of video data in a wide range of applications from visual surveillance to human-machine interfaces, the ability to automatically analyze and understand object motions from video footage is of increasing importance. Meer
Most biometric systems employed for human recognition require physical contact with, or close proximity to, a cooperative subject. Far more challenging is the ability to reliably recognize individuals at a distance, when viewed from an arbitrary angle under real-world environmental conditions. Meer
Advances in Systems Safety contains the papers presented at the nineteenth annual Safety-Critical Systems Symposium, held at Southampton, UK, in February 2011. Meer
This textbook is a systematic guide to the steps in setting up a Capability Maturity Model Integration (CMMI) improvement initiative. Readers will learn the project management practices necessary to deliver high-quality software solutions to the customer on time and on budget. Meer
This text reviews the issues involved in handling and processing digital documents. Examining the full range of a document’s lifetime, the book covers acquisition, representation, security, pre-processing, layout analysis, understanding, analysis of single components, information extraction, filing, indexing and retrieval. Meer
Ubiquitous environments are important because they allow users to move about freely and continue the interaction with the available applications through a variety of interactive devices (including cell phones, PDA's, desktop computers, digital television sets, and intelligent watches). Meer
The proposed book explores the theme of identity, specifically as applied to its role and development in virtual worlds. Following the introduction, it is divided into four sections: identities, avatars and the relationship between them; factors that support the development of identity in virtual worlds; managing multiple identities across different environments and creating an online identity for a physical world purpose. Meer
This timely text/reference presents the latest advances in various aspects of social media modeling and social media computing research. Gathering together superb research from a range of established international conferences and workshops, the editors coherently organize and present each of the topics in relation to the basic principles and practices of social media modeling and computing. Meer
This book considers biometric technology in a broad light, integrating the concept seamlessly into mainstream IT, while discussing the cultural attitudes and the societal impact of identity management. Meer
The title of this new book: “The Connected Home” reflects the move away from the idea that smart homes would alter the lives of those living in them by providing technologies to take over tasks that were previously the responsibility of the householder, such as managing entertainment, education – and even eating! Meer
The Information System Consultant's Handbook familiarizes systems analysts, systems designers, and information systems consultants with underlying principles, specific documentation, and methodologies. Meer
Observing the environment and recognising patterns for the purpose of decision making is fundamental to human nature. This book deals with the scientific discipline that enables similar perception in machines through pattern recognition (PR), which has application in diverse technology areas. Meer
Written in an informal yet informative style, Programming Language Fundamentals by Example uses active learning techniques, giving students a professional learning experience based on professional methods applied with professional standards. Meer
The sense of touch is fundamental during the interaction between humans and their environment; in virtual reality, objects are created by computer simulations and they can be experienced through haptic devices. Meer
Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs. Meer
Algorithms and Data Structures in C++ introduces modern issues in the theory of algorithms, emphasizing complexity, graphs, parallel processing, and visualization. Meer
The roots of the project which culminates with the writing of this book can be traced to the work on logic synthesis started in 1979 at the IBM Watson Research Center and at University of California, Berkeley. Meer
Administrators of academic professional and technical communication (PTSC) programs have long relied upon lore--stories of what works--to understand and communicate about the work of program administration. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books