This book constitutes selected papers of the Third International Conference on Data Science, Medicine and Bioinformatics, IDMB 2019, held in Nanning, China, in June 2019. Meer
This book is a collection of high-quality research work on cutting-edge technologies and the most-happening areas of computational intelligence and data engineering. Meer
This book is a collection of high-quality research work on cutting-edge technologies and the most-happening areas of computational intelligence and data engineering. Meer
This book contains the proceedings of the 12th KES International Conference on Sustainability and Energy in Buildings 2020 (SEB20) held in Split, Croatia, during 24–26 June 2020 organized by KES International. Meer
To make the content of the book more systematic, this book mainly briefs some related basic knowledge reported by other monographs and papers about geometric mechanics. Meer
To make the content of the book more systematic, this book mainly briefs some related basic knowledge reported by other monographs and papers about geometric mechanics. Meer
Focusing on the vision-based and sensor-based recognition and analysis of human activity and behavior, this book gathers extended versions of selected papers presented at the International Conference on Activity and Behavior Computing (ABC 2020), held in Kitakyushu, Japan on August 26 – 29, 2020. Meer
This book constitutes refereed proceedings of the 2nd International Conference on Artificial Intelligence Logic and Applications 2022 held in Shanghai, China from August 26–28, 2022. Meer
This book constitutes refereed proceedings of the 7th China National Conference on Big Data and Social Computing, BDSC 2022, held in Hangzhou, China, from August 11-13, 2022
The 24 full papers and 2 short papers presented in this volume were carefully reviewed and selected from a total of 99 submissions. Meer
This book comprises select proceedings of the International Conference on Advances in Electrical and Computer Technologies 2020 (ICAECT 2020). The papers presented in this book are peer-reviewed and cover latest research in electrical, electronics, communication and computer engineering. Meer
This book comprises select proceedings of the International Conference on Advances in Electrical and Computer Technologies 2020 (ICAECT 2020). The papers presented in this book are peer-reviewed and cover latest research in electrical, electronics, communication and computer engineering. Meer
This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. Meer
This book demonstrates how mathematical methods and techniques can be used in synergy and create a new way of looking at complex systems. It becomes clear nowadays that the standard (graph-based) network approach, in which observable events and transportation hubs are represented by nodes and relations between them are represented by edges, fails to describe the important properties of complex systems, capture the dependence between their scales, and anticipate their future developments. Meer
This book constitutes the refereed proceedings of the 7th China Conference on Knowledge Graph and Semantic Computing: Knowledge Graph Empowers the Digital Economy, CCKS 2022, in Qinhuangdao, China, August 24–27, 2022. Meer
This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. Meer
This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. Meer
In this monograph we introduce and examine four new temporal logic formalisms that can be used as specification languages for the automated verification of the reliability of hardware and software designs with respect to a desired behavior. Meer
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. Meer
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. Meer
This book constitutes the thoroughly refereed post conference papers of the Second International Conference on Blockchain and Trustworthy Systems, Blocksys 2020, held in Dali, China*, in August 2020. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books