Conquer data hurdles, supercharge your ML journey, and become a leader in your field with synthetic data generation tech......more
This book constitutes the refereed proceedings of the first International Workshop on Applications of Medical Artificial......more
This book constitutes the proceedings of the First International Conference on Complex Computational Ecosystems, CCE 202......more
According to the Real Academia de la Lengua Española, security refers to the "quality of being safe". This definition al......more
The native of Oil Palm (Elaeis Guineensis) is west Africa, which is commercially planted in Nigeria, Malaysia, Zaire, In......more
A special quality about the medium of virtual reality is its immersive nature, allowing users to disengage from the phys......more
Interlaced within a survey of artists whose works fit in the boundary of the interactive virtual medium, this book tease......more
...more
This three-volume set, LNCS 14325-14327 constitutes the thoroughly refereed proceedings of the 20th Pacific Rim Conferen......more
This three-volume set, LNCS 14325-14327 constitutes the thoroughly refereed proceedings of the 20th Pacific Rim Conferen......more
Preparing for your extended warehouse management (EWM) exam? Make the grade with this C_S4EWM certification study guide!......more
This textbook introduces readers to the fundamental hardware used in modern computers. The only pre-requisite is algebra......more
This book is a major work in the field of wireless communication technologies. Written by a renowned expert in the field......more
Wireless Sensor Networks (WSNs) are a cutting-edge technology that could completely change a number of facets of contemp......more
Electronica: Discovering the Marvels of the Digital Age James Mitchell, the author. With "Electronica: Exploring the Won......more
Blockchains are meant to provide an append-only sequence (ledger) of transactions. Security commonly relies on a consens......more
We are often expected to trust technologies, and how they are used, even if we have good reason not to. There is no room......more
"A compelling new biography... [The Greatest Capitalist Who Ever Lived] spins the Watsons into near-Shakespearean figure......more
This book constitutes the proceedings of the 24th International Conference on Formal Methods and Software Engineering, I......more
The use of computer techniques and tools is of the utmost importance to help analyse data, such as Data Mining. Data min......more
Studying complex systems theory means studying the systems approach and systems analysis. The book analyzes the concept ......more
The book is devoted to the study of information field processes. The content of the information field is revealed. Its r......more
The book is devoted to the study of information field resources. The content of the information field is disclosed. The ......more
Modern informatics is important for the development of scientific research related to the study of the external world ba......more
Explore the dynamic intersection of DevOps and security in our book, ’Mastering DevOps with Continuous Security: Advance......more
...more
This volume LNCS 14213 constitutes the refereed proceedings of the 19th International Conference, LENLS 2019, held in No......more
The organization of the material is presented as follows: This introductory chapter I represents a theoretical analysis ......more
Sarah Mitchell’s "Digital Marketplaces: Navigating the World of E-Commerce" is a thorough manual that elucidates the com......more
The present reprint contains 11 articles accepted for publication and published in the Special Issue From COVID-19 to Re......more
Artificial Intelligence is vital to the evolution of agriculture into a smart industry. The objective of this book is to......more
This book collects a range of contributions on nonlinear dynamics and complexity, providing a systematic summary of rece......more
...more
This book constitutes the refereed post-conference proceedings of the 28th International Workshop on Security Protocols,......more
...more
This textbook provides a starter’s guide to VHDL. This book can be used in conjunction with a one-semester course in Dig......more
Intelligent Techniques for Cyber-Physical Systems covers challenges, opportunities, and open research directions for cyb......more
Explainable AI methods have been proposed to tackle this issue by producing human interpretable representations of machi......more
This book constitutes the refereed proceedings of the 8th International Conference on Advances in Visual Informatics, IV......more
As one of the fastest-growing topics in machine learning, deep learning algorithms have achieved unprecedented success i......more
The purpose of this Special Issue is to pay tribute to the significant contributions made by Professor Feng Qi in these ......more
This textbook for courses in Digital Systems Design introduces students to the fundamental hardware used in modern compu......more
The power of data drives the digital economy of the 21st century. It has been argued that data is as vital a resource as......more
"Linux for Novices: A Beginner’s Guide to Mastering the Linux Operating System" is your comprehensive introduction to th......more
This book constitutes the refereed proceedings of the 21st International Symposium on Automated Technology for Verificat......more
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidenc......more
Natural Language Processing (NLP) is a sub-field of Artificial Intelligence, linguistics, and computer science and is co......more
At present, data is constantly generated across various industries, including the internet. New technologies have emerge......more
The field of Artificial Intelligence (AI) has undergone enormous expansion since its inception in the mid-20th century, ......more
In this opening chapter, readers are introduced to the rapidly evolving world of technology and its profound impact on t......more
This book aims to strengthen programming skills and foster creative thinking by presenting and solving 90 challenging pr......more
"The book presents automata theory from a fresh viewpoint inspired by its main modern application: program verification"......more
How we can create artificial intelligence with broad, robust common sense rather than narrow, specialized expertise. It’......more
The Routledge Companion Literature and the Global South offers a comprehensive overview of the field at a key moment in ......more
Video Based Machine Learning for Traffic Intersections describes the development of computer vision and machine learning......more
This edited book reviews the intertwining disciplines of nature-inspired optimization algorithms and bio-inspired soft-c......more
The emergence of artificial intelligence has triggered enthusiasm and promise of boundless opportunities as much as unce......more
Security intelligence is a results-driven approach to reducing risk that combines internal and external information abou......more
Technically, the blockchain revolution is based on the concept of "public verifiability", that is to say: a technical sy......more
Forest Door, Discreet Internet Password Logbook, Large Print Never forget A Password Again! Protect and keep your passwo......more
Watercolor Garden Discreet Internet Password Organizer.Large Print Protect and keep your passwords organized in this con......more
"Principles of Computer Science is an invigorating and rapid adventure that covers core introductory theoretical compute......more
Ruby is a superb programming language used for a variety of activities such as developing desktop applications, static w......more
This book is associated with the cybersecurity issues and provides a wide view of the novel cyber attacks and the defens......more
Where most introductory texts to the field of digital signal processing assume a degree of technical knowledge, this cla......more
Where most introductory texts to the field of digital signal processing assume a degree of technical knowledge, this cla......more
AI (AGI) is here and it is already having an impact on education, and on society at large. In this100-page book, we expl......more
This book constitutes the refereed proceedings of the 33rd International Symposium on Logic-Based Program Synthesis and ......more
This contributed volume contains a collection of articles on state-of-the-art developments on the construction of theore......more
The blue economy is a relatively new concept, but it has quickly gained traction in recent years. It refers to the susta......more
This book constitutes the refereed proceedings of the 7th International Joint Conference on Rules and Reasoning, RuleML+......more
The two-volume set LNCS 14348 and 14139 constitutes the proceedings of the 14th International Workshop on Machine Learni......more
This book constitutes the refereed proceedings of the 5th MICCAI Workshop on Domain Adaptation and Representation Transf......more
This book constitutes the proceedings of the 5th Conference on Creativity in Intellectual Technologies and Data Science,......more
This book describes the historical development of the architectures of the first computers built by the German inventor ......more
...more
Introducing "OneNote Mastery: Digital Note-Taking and Collaboration" - Your Comprehensive Guide to Unlocking the Full Po......more
Introducing "Microsoft Teams: Collaboration in the Modern Workplace" - Your Comprehensive Guide to Unlocking the Power o......more
Unlock the secrets of captivating design with "PublisherProficiency: Designing Eye-Catching Documents." This comprehensi......more
"Visio Visualized: Diagramming for Clarity and Insight" is your comprehensive guide to harnessing the full potential of ......more
Are you ready to unlock the full potential of SharePoint? Dive into "SharePoint Simplified: Building Intranets and Colla......more
This textbook provides a starter’s guide to Verilog, to be used in conjunction with a one-semester course in Digital Sys......more
The E-Commerce World: How to Win in Today’s Digital Marketplace. Johnathan Reynolds is the author. When reading Johnatha......more
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and t......more
A rigorous primer in movement studies for designers, engineers, and scientists that draws on the fields of dance and rob......more
Providing a comprehensive overview of the modelling of complex systems, with particular emphasis on the collective aspec......more
Print out whatever you can dream up 3D Printing For Dummies is an easy reference for anyone new to the process of taking......more
This textbook covers the basic concepts and applications of finite element analysis. It is specifically aimed at introdu......more
This book presents and surveys normalization techniques with a deep analysis in training deep neural networks. In addit......more
This Special Issue is mainly concerned with quantum algorithms, their mathematics from behind and the complexity issues ......more
Organisations are currently dealing with huge and growing volumes and varieties of data. Only a small proportion of this......more
This work was designed to help bodies such as Civil Defence in predicting landslides in the city of Teófilo Otoni (MG). ......more
The main focus of the book is solvability of cellular automata, that is, expressing the state of a given cell after a gi......more
This book constitutes the refereed proceedings of the 12th International Workshop on Clinical Image-Based Procedures, CL......more
The application of generalized and fractional derivatives, such as Caputo and Riemann-Liouville derivatives, has witness......more
In the field of computer modeling and simulation, academic scholars face a pressing challenge-how to navigate the comple......more
In the field of computer modeling and simulation, academic scholars face a pressing challenge-how to navigate the comple......more