Cloud Computing and Big Data technologies have become the new descriptors of the digital age. The global amount of digital data has increased more than nine times in volume in just five years and by 2030 its volume may reach a staggering 65 trillion gigabytes. Meer
Cyber-physical systems are the natural extension of the so-called “Internet of Things”. They are “systems of collaborating computational elements controlling physical entities”. Meer
The book addresses the current demand for a scientific approach to advanced wireless technology and its future developments, including the current move from 4G to 5G wireless systems (2020), and the future to 6G wireless systems (2030). Meer
Text analytics consist of the statistics about a text element, which includes the word count, the word histogram, and the word frequency histogram. Most text documents of value are related to other—sometimes many other—documents, and so analytics describing the relative frequency of terms in a document compared to its peers are important for defining key words (tagging, labeling, indexing), search-responsive terms (query terms), and compressed versions of the documents (key words, summary, etc. Meer
The signal processing (SP) landscape has been enriched by recent advances in artificial intelligence (AI) and machine learning (ML), yielding new tools for signal estimation, classification, prediction, and manipulation. Meer
The book discusses the activities involved in developing an Enterprise Continuity Program (ECP) that will cover both Business Continuity Management (BCM) as well as Disaster Recovery Management (DRM). Meer
Starting with the historical facts behind the concept of information, which led to the creation of computer networks, Internet of things and cryptocurrencies, the book then arrives at the main definitions of cryptography and network security, the protocols that keep the systems running and the cybercrimes that could disrupt the systems. Meer
Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffectively. Meer
Visualization and visual analytics are powerful concepts for exploring data from various application domains. The endless number of possible parameters and the many ways to combine visual variables as well as algorithms and interaction techniques create lots of possibilities for building such techniques and tools. Meer
Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to many things and different areas, making a concrete definition of security architecture a difficult proposition. Meer
While the JPEG image standard was developed more than 25 years ago, it is still dominant in terms of image formation, manipulation and transmission over the internet and other media. Meer
5G, the emerging technology in mobile communication, is expected to deliver an important and decisive impact on several of the UN’s Sustainable Development Goals where universal accessibility to ICTs remains a serious concern. Meer
This book provides in-depth insights into use cases implementing artificial intelligence (AI) applications at the edge. It covers new ideas, concepts, research, and innovation to enable the development and deployment of AI, the industrial internet of things (IIoT), edge computing, and digital twin technologies in industrial environments. Meer
This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. Meer
Since its birth, the field of Probabilistic Logic Programming has seen a steady increase of activity, with many proposals for languages and algorithms for inference and learning. Meer
This book covers a wide range of challenges, technologies and state-of-the-art for the design, development and realization of smart and complex embedded systems and their applications; i. Meer
The proclivity of today’s technology to think like humans may be seen in new developing disciplines such as neural computing, fuzzy logic, evolutionary computation, machine learning, and probabilistic reasoning. Meer
Almost all the systems in our world, including technical, social, economic, and environmental systems, are becoming interconnected and increasingly complex, and as such they are vulnerable to various risks. Meer
Systems, cybernetics, control, and automation (SCCA)are four interrelated and overlapping scientific and technological fields that have contributed substantially to the development, growth, and progress of human society. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books