This book includes the original, peer reviewed research articles from the 2nd International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA 2020), held in August, 2020 at Goa, India. Meer
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. Meer
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. Meer
This book presents selected papers from the Sixteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the Thirteenth International Conference on Frontiers of Information Technology, Applications and Tools, held on November 5–7, 2020, in Ho Chi Minh City, Vietnam. Meer
This book includes an extended version of selected papers presented at the 11th Industry Symposium 2021 held during January 7–10, 2021. The book covers contributions ranging from theoretical and foundation research, platforms, methods, applications, and tools in all areas. Meer
This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Meer
This book is targeted towards cybersecurity professionals (especially those dealing with cloud security) or any stakeholders dealing with cybersecurity who want to understand the next level of security infrastructure using blockchain. Meer
This book is targeted towards cybersecurity professionals (especially those dealing with cloud security) or any stakeholders dealing with cybersecurity who want to understand the next level of security infrastructure using blockchain. Meer
This book includes selected papers from the 4th International Conference on Computational Vision and Bio Inspired Computing (ICCVBIC 2020), held in Coimbatore, India, from November 19 to 20, 2020. Meer
This book features original papers from 25th International Symposium on Frontiers of Research in Speech and Music (FRSM 2020), jointly organized by National Institute of Technology, Silchar, India, during 8–9 October 2020. Meer
This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Third International Conference on Soft Computing and Signal Processing (ICSCSP 2020). Meer
This book aims to foster machine and deep learning approaches to data-driven applications, in which data governs the behaviour of applications. Applications of Artificial intelligence (AI)-based systems play a significant role in today’s software industry. Meer
Although there has been much progress in developing theories, models and systems in the areas of Natural Language Processing (NLP) and Vision Processing (VP), there has heretofore been little progress on integrating these two subareas of Artificial Intelligence (AI). Meer
Researchers from various disciplines such as pattern recognition, statistics, and machine learning have explored the use of ensemble methodology since the late seventies. Meer
Security issues in ad-hoc and sensor networks have become extremely important. This book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Meer
Covers the mathematical foundations of the analysis of algorithms. This book considers the basic and traditional algorithms of computer science, such as Greedy, Dynamic and Divide and Conquer. Meer
Contains selected contributed papers from the BIOMAT 2008 Symposium and lectures delivered by keynote speakers during the plenary sessions. This volume focuses on fundamental interdisciplinary areas of mathematical modeling of biosystems, like mathematical biology, biological physics, evolution biology and bioinformatics. Meer
It has been shown how the common structure that defines a family of proofs can be expressed as a proof plan [5]. This common structure can be exploited in the search for particular proofs. Meer
Provides a forum for the dissemination of knowledge in both theoretical and applied research on swarm intelligence (SI) and artificial neural network (ANN). Meer
Offers both theoretical and application points of views, the developments and reviews in various areas of pattern recognition, image processing, machine learning, soft computing, data mining and web intelligence. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books