149 results (0,22555 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Pocket Book of Integrals and Mathematical Formulas

Deep Learning A Comprehensive Guide

Principles and Practices of CAD/CAM

Principles and Practices of CAD/CAM

CAD/CAM systems are perhaps the most crucial advancement in the field of new technology relating to engineering design and drawing in all technical domains. CAD/CAM stands for computer-aided design and computer-aided manufacturing. These systems are useful in all facets of contemporary design and architecture. The fundamentals of CAD/CAM systems are covered in detail throughout this book. This book aims to introduce the fundamental aspects complete with an adequate numberof illustrations and examples without delving too deeply into the specifics of the subject matter. This book is valuable in the classroom for both teachers and students. Features Each chapter begins with the Learning Outcomes (LOs) section which highlights the critical points of that chapter. All LOs solved examples and questions are mapped to six Bloom Taxonomy levels (BT levels). Offers fundamental concepts of CAD/CAM without becoming too complicated. Solved examples are presented in each section after the theoretical discussion to clarify the concept of that section. Chapter-end summaries reinforce key ideas and help readers recall the concepts discussed. Students and professionals need to have a working knowledge of CAD/CAM since it has many applications and continues to expand. Students at the undergraduate and graduate levels of engineering courses use this book as their primary textbook. It will also be helpful for managers consultants and professionals. | Principles and Practices of CAD/CAM

GBP 110.00
1

Introduction to Python Programming

Introduction to Python Programming

Introduction to Python Programming is written for students who are beginners in the field of computer programming. This book presents an intuitive approach to the concepts of Python Programming for students. This book differs from traditional texts not only in its philosophy but also in its overall focus level of activities development of topics and attention to programming details. The contents of the book are chosen with utmost care after analyzing the syllabus for Python course prescribed by various top universities in USA Europe and Asia. Since the prerequisite know-how varies significantly from student to student the book’s overall overture addresses the challenges of teaching and learning of students which is fine-tuned by the authors’ experience with large sections of students. This book uses natural language expressions instead of the traditional shortened words of the programming world. This book has been written with the goal to provide students with a textbook that can be easily understood and to make a connection between what students are learning and how they may apply that knowledge. Features of this book This book does not assume any previous programming experience although of course any exposure to other programming languages is useful This book introduces all of the key concepts of Python programming language with helpful illustrations Programming examples are presented in a clear and consistent manner Each line of code is numbered and explained in detail Use of f-strings throughout the book Hundreds of real-world examples are included and they come from fields such as entertainment sports music and environmental studies Students can periodically check their progress with in-chapter quizzes that appear in all chapters

GBP 160.00
1

Banach Limit and Applications

Banach Limit and Applications

Banach Limit and Applications provides all the results in the area of Banach Limit its extensions generalizations and applications to various fields in one go (as far as possible). All the results in this field after Banach introduced this concept in 1932 were scattered till now. Sublinear functionals generating and dominating Banach Limit unique Banach Limit (almost convergence) invariant means and invariant limits absolute and strong almost convergence applications to ergodicity law of large numbers Fourier series uniform distribution of sequences uniform density core theorems and functional Banach limits are discussed in this book. The discovery of functional analysis such as the Hahn-Banach Theorem and the Banach-Steinhaus Theorem helped the researchers to develop a modern rich and unified theory of sequence spaces by encompassing classical summability theory via matrix transformations and the topics related to sequence spaces which arose from the concept of Banach limits all of which are presented in this book. The unique features of this book are as follows: All the results in this area which were scattered till now are in one place. The book is the first of its kind in the sense that there is no other competitive book. The contents of this monograph did not appear in any book form before. The audience of this book are the researchers in this area and Ph. D. and advanced master’s students. The book is suitable for one- or two-semester course work for Ph. D. students M. S. students in North America and Europe and M. Phil. and master’s students in India.

GBP 130.00
1

Decision Support System and Automated Negotiations

Cloud Security Attacks Techniques Tools and Challenges

Cloud Security Attacks Techniques Tools and Challenges

Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks Techniques Tools and Challenges provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures and all those who are curious in the field of cloud security The book offers comprehensive coverage of the most essential topics including: Basic fundamentals of Cloud Computing Cloud security concepts vulnerabilities security standards and reference models Cloud security goals key issues and privacy requirements Threat model detailed taxonomy of cloud attacks Attack feature analysis – case study A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS) Attack and security tools LibVMI – case study Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) Container security: threat model attacks and defense systems This book is intended for both academic and professional audience. It could also be used as a textbook for a semester course at undergraduate and post graduate level in Computer Science Information Technology Information Security and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners cloud security team and the cloud security auditor as well. To get the most out of this book the reader should have a working knowledge of various operating system environments hypervisors cloud computing fundamentals programming languages like Python and a working knowledge of security tools. | Cloud Security Attacks Techniques Tools and Challenges

GBP 130.00
1

Fog Computing Concepts Frameworks and Applications

Fog Computing Concepts Frameworks and Applications

Fog Computing: Concepts Frameworks and Applications is arranged in such a way that readers with no prior experience in Fog Computing may explore this domain. It is an accessible source of information for distributed computing researchers as well as professionals looking to improve their security and connectivity understanding in Internet of Things (IoT) devices. This book is also useful for researchers and professionals working in the field of wireless communication security and privacy research. This book is intended for students professionals researchers and developers who are working in or interested in the field of Fog Computing. One of the book's distinguishing aspects is that it covers a variety of case studies and future possibilities in the field of Fog Computing. This book: Begins by covering the fundamental notions of Fog Computing to help readers grasp the technology starting from the basics Explains Fog Computing architecture as well as the convergence of Fog IoT and Cloud Computing Provides an assessment of Fog Computing and its applications in the field of IoT Discusses the usage of software defined networking and machine learning algorithms as they apply to Fog Computing Describes the different security and privacy issues with Fog Computing and explores single point control systems for consumer devices using Edge-Fog Computing Outlines in detail how to leverage Blockchain technology in Fog Computing as well as how to use Fog Computing in telemedicine and healthcare applications Examines the usage of communication protocols simulation tools for Fog Computing implementation and case studies in the fields of bioinformatics disaster control and IoT | Fog Computing Concepts Frameworks and Applications

GBP 145.00
1

Machine Learning for Healthcare Handling and Managing Data

Machine Learning for Healthcare Handling and Managing Data

Machine Learning for Healthcare: Handling and Managing Data provides in-depth information about handling and managing healthcare data through machine learning methods. This book expresses the long-standing challenges in healthcare informatics and provides rational explanations of how to deal with them. Machine Learning for Healthcare: Handling and Managing Data provides techniques on how to apply machine learning within your organization and evaluate the efficacy suitability and efficiency of machine learning applications. These are illustrated in a case study which examines how chronic disease is being redefined through patient-led data learning and the Internet of Things. This text offers a guided tour of machine learning algorithms architecture design and applications of learning in healthcare. Readers will discover the ethical implications of machine learning in healthcare and the future of machine learning in population and patient health optimization. This book can also help assist in the creation of a machine learning model performance evaluation and the operationalization of its outcomes within organizations. It may appeal to computer science/information technology professionals and researchers working in the area of machine learning and is especially applicable to the healthcare sector. The features of this book include: A unique and complete focus on applications of machine learning in the healthcare sector. An examination of how data analysis can be done using healthcare data and bioinformatics. An investigation of how healthcare companies can leverage the tapestry of big data to discover new business values. An exploration of the concepts of machine learning along with recent research developments in healthcare sectors. | Machine Learning for Healthcare Handling and Managing Data

GBP 115.00
1

C Programming Learn to Code

C Programming Learn to Code

The C programming language is a popular language in industries as well as academics. Since its invention and standardized as ANSI C several other standards known as C99 C11 and C17 were published with new features in subsequent years. This book covers all the traits of ANSI C and includes new features present in other standards. The content of this book helps a beginner to learn the fundamental concept of the C language. The book contains a step-by-step explanation of every program that allows a learner to understand the syntax and builds a foundation to write similar programs. The explanation clarity exercises and illustrations present in this book make it a complete textbook in all aspects. Features: Other than ANSI C the book explains the new C standards like C99 C11 and C17. Most basic and easy-to-follow programs are chosen to explain the concepts and their syntax. More emphasis is given to the topics like Functions Pointers and Structures. Recursion is emphasized with numerous programming examples and diagrams. A separate chapter on the command-line argument and preprocessors is included that concisely explains their usage. Several real-life figures are taken to explain the concepts of dynamic memory allocation file handling and the difference between structure and union. The book contains more than 260 illustrations more than 200 programs and exercises at the end of each chapter. This book serves as a textbook for UG/PG courses in science and engineering. The researcher postgraduate engineers and embedded software developers can also keep this book as reference material for their fundamental learning. | C Programming Learn to Code

GBP 105.00
1

Continuous Optimization and Variational Inequalities

Continuous Optimization and Variational Inequalities

The proposed book provides a comprehensive coverage of theory and methods in the areas of continuous optimization and variational inequality. It describes theory and solution methods for optimization with smooth and non-smooth functions for variational inequalities with single-valued and multivalued mappings and for related classes such as mixed variational inequalities complementarity problems and general equilibrium problems. The emphasis is made on revealing generic properties of these problems that allow creation of efficient solution methods. Salient Features The book presents a deep wide-ranging introduction to the theory of the optimal control of processes governed by optimization techniques and variational inequality Several solution methods are provided which will help the reader to develop various optimization tools for real-life problems which can be modeled by optimization techniques involving linear and nonlinear functions. The book focuses on most recent contributions in the nonlinear phenomena which can appear in various areas of human activities. This book also presents relevant mathematics clearly and simply to help solve real life problems in diverse fields such as mechanical engineering management control behavior traffic signal industry etc. This book is aimed primarily at advanced undergraduates and graduate students pursuing computer engineering and electrical engineering courses. Researchers academicians and industry people will also find this book useful. | Continuous Optimization and Variational Inequalities

GBP 130.00
1

Stochastic Differential Equations for Science and Engineering

Cyber-Physical Systems A Comprehensive Guide

Cyber-Physical Systems A Comprehensive Guide

Cyber-Physical Systems: A Comprehensive Guide explores the complete sys-tem perspective underlying theories modelling and the applications of Cyber Physical Systems (CPS). It aims to cover all topics ranging from discussion of ru-diments of the system efficient management to recent research challenges and issues. Editors aim to present the book in a self-sufficient manner and to achieve this the book has been edited to include all the aspects of CPS. The book fo-cuses on the concept map of CPS including latest technological interventions; issues challenges and the integration of CPS with IoT & Big Data Analytics. This aims to bring together unique contributions on cyber-physical systems research and education with applications in industrial agriculture and medical domains. The main aim of the book is to provide a roadmap to the latest advancements to provide optimal solutions in the field of CPS. Features • Coverage of rudiments of the subject• Discussion of recent advancements in the associated field• Considers an audience of diverse domains• Suitable for students (both UG and PG level) and researchers in the field of CPS This book aims to present the emergence of Cyber Physical Systems in response to revolutionary advancements in IoT. While discussing the associated challenges it also endeavors to devise efficient models which are competent to address these challenges. This book aims to cater to researchers and academicians working in the related field of CPS. | Cyber-Physical Systems A Comprehensive Guide

GBP 145.00
1

Software Security Concepts & Practices

Introduction to Financial Mathematics With Computer Applications

The Art of Algorithm Design

NoSQL Database for Storage and Retrieval of Data in Cloud

Convex Analysis

Data Science Techniques and Intelligent Applications

Network Forensics Privacy and Security

Network Forensics Privacy and Security

This book primarily focuses on providing deep insight into the concepts of network security network forensics botnet forensics ethics and incident response in global perspectives. It also covers the dormant and contentious issues of the subject in most scientific and objective manner. Various case studies addressing contemporary network forensics issues are also included in this book to provide practical know – how of the subject. Network Forensics: A privacy & Security provides a significance knowledge of network forensics in different functions and spheres of the security. The book gives the complete knowledge of network security all kind of network attacks intention of an attacker identification of attack detection its analysis incident response ethical issues botnet and botnet forensics. This book also refer the recent trends that comes under network forensics. It provides in-depth insight to the dormant and latent issues of the acquisition and system live investigation too. Features: Follows an outcome-based learning approach. A systematic overview of the state-of-the-art in network security tools Digital forensics. Differentiation among network security computer forensics network forensics and botnet forensics. Discussion on various cybercrimes attacks and cyber terminologies. Discussion on network forensics process model. Network forensics tools and different techniques Network Forensics analysis through case studies. Discussion on evidence handling and incident response. System Investigations and the ethical issues on network forensics. This book serves as a reference book for post graduate and research investigators who need to study in cyber forensics. It can also be used as a textbook for a graduate level course in Electronics & Communication Computer Science and Computer Engineering. | Network Forensics Privacy and Security

GBP 130.00
1

Using the R Commander A Point-and-Click Interface for R

Medical Internet of Things Techniques Practices and Applications

Medical Internet of Things Techniques Practices and Applications

In recent years the Medical Internet of Things (MIoT) has emerged as one of the most helpful technological gifts to mankind. With the incredible development in data science big data technologies IoT and embedded systems it is now possible to collect a huge amount of sensitive and personal data compile it and store it through cloud or edge computing techniques. However important concerns remain about security and privacy the preservation of sensitive and personal data and the efficient transfer storage and processing of MIoT-based data. Medical Internet of Things: Techniques Practices and Applications is an attempt to explore new ideas and novel techniques in the area of MIoT. The book is composed of fifteen chapters discussing basic concepts issues challenges case studies and applications in MIoT. This book offers novel advances and applications of MIoT in a precise and clear manner to the research community to achieve in-depth knowledge in the field. This book will help those interested in the field as well as researchers to gain insight into different concepts and their importance in multifaceted applications of real life. This has been done to make the book more flexible and to stimulate further interest in the topic. Features: A systematic overview of concepts in Medical Internet of Things (MIoT) is included. Recent research and some pointers on future advancements in MIoT are discussed. Examples and case studies are included. It is written in an easy-to-understand style with the help of numerous figures and datasets. This book serves as a reference book for scientific investigators who are interested in working on MIoT as well as researchers developing methodology in this field. It may also be used as a textbook for postgraduate-level courses in computer science or information technology. | Medical Internet of Things Techniques Practices and Applications

GBP 130.00
1

Intensive Longitudinal Analysis of Human Processes

Intensive Longitudinal Analysis of Human Processes

This book focuses on a span of statistical topics relevant to researchers who seek to conduct person-specific analysis of human data. Our purpose is to provide one consolidated resource that includes techniques from disciplines such as engineering physics statistics and quantitative psychology and outlines their application to data often seen in human research. The book balances mathematical concepts with information needed for using these statistical approaches in applied settings such as interpretative caveats and issues to consider when selecting an approach. The statistical topics covered here include foundational material as well as state-of-the-art methods. These analytic approaches can be applied to a range of data types such as psychophysiological self-report and passively collected measures such as those obtained from smartphones. We provide examples using varied data sources including functional MRI (fMRI) daily diary and ecological momentary assessment data. Features: Description of time series measurement model building and network methods for person-specific analysis Discussion of the statistical methods in the context of human research Empirical and simulated data examples used throughout the book R code for analyses and recorded lectures for each chapter available at the book website: https://www. personspecific. com/ Across various disciplines of human study researchers are increasingly seeking to conduct person-specific analysis. This book provides comprehensive information so no prior knowledge of these methods is required. We aim to reach active researchers who already have some understanding of basic statistical testing. Our book provides a comprehensive resource for those who are just beginning to learn about person-specific analysis as well as those who already conduct such analysis but seek to further deepen their knowledge and learn new tools. | Intensive Longitudinal Analysis of Human Processes

GBP 89.99
1

The Biometric Computing Recognition and Registration

The Biometric Computing Recognition and Registration

The Biometric Computing: Recognition & Registration presents introduction of biometrics along with detailed analysis for identification and recognition methods. This book forms the required platform for understanding biometric computing and its implementation for securing target system. It also provides the comprehensive analysis on algorithms architectures and interdisciplinary connection of biometric computing along with detailed case-studies for newborns and resolution spaces. The strength of this book is its unique approach starting with how biometric computing works to research paradigms and gradually moves towards its advancement. This book is divided into three parts that comprises basic fundamentals and definitions algorithms and methodologies and futuristic research and case studies. Features: A clear view to the fundamentals of Biometric Computing Identification and recognition approach for different human characteristics Different methodologies and algorithms for human identification using biometrics traits such as face Iris fingerprint palm print voiceprint etc. Interdisciplinary connection of biometric computing with the fields like deep neural network artificial intelligence Internet of Biometric Things low resolution face recognition etc. This book is an edited volume by prominent invited researchers and practitioners around the globe in the field of biometrics describes the fundamental and recent advancement in biometric recognition and registration. This book is a perfect research handbook for young practitioners who are intending to carry out their research in the field of Biometric Computing and will be used by industry professionals graduate and researcher students in the field of computer science and engineering. | The Biometric Computing Recognition and Registration

GBP 140.00
1

Sample Sizes for Clinical Trials

Sample Sizes for Clinical Trials

Sample Sizes for Clinical Trials Second Edition is a practical book that assists researchers in their estimation of the sample size for clinical trials. Throughout the book there are detailed worked examples to illustrate both how to do the calculations and how to present them to colleagues or in protocols. The book also highlights some of the pitfalls in calculations as well as the key steps that lead to the final sample size calculation. Features: Comprehensive coverage of sample size calculations including Normal binary ordinal and survival outcome data Covers superiority equivalence non-inferiority bioequivalence and precision objectives for both parallel group and crossover designs Highlights how trial objectives impact the study design with respect to both the derivation of sample formulae and the size of the study Motivated with examples of real-life clinical trials showing how the calculations can be applied New edition is extended with all chapters revised some substantially and four completely new chapters on multiplicity cluster trials pilot studies and single arm trials The book is primarily aimed at researchers and practitioners of clinical trials and biostatistics and could be used to teach a course on sample size calculations. The importance of a sample size calculation when designing a clinical trial is highlighted in the book. It enables readers to quickly find an appropriate sample size formula with an associated worked example complemented by tables to assist in the calculations.

GBP 89.99
1