This book is intended for students, researchers, and professionals interested in evolutionary algorithms at graduate and postgraduate level. No mathematics beyond basic algebra and Cartesian graphs methods is required, as the aim is to encourage applying the JAVA toolkit to develop an appreciation of the power of these techniques. Meer
This book describes the programming language Modula-2. It is written for people who know the Pascal language and who wish to learn Modula-2 in terms of their knowledge of Pascal. Meer
Vallombrosa Center was host during the week September 7-12, 1985 to about 40 mathematicians, physical scientists, and engineers, who share a common interest in free surface phenomena. Meer
The author starts with the premise that C is an excellent
language for software engineering projects. The book con-
centrates on programming style,particularly readability,
maintainability, and portability. Meer
This unique and valuable source of information describes the protocol suite according to the International Organization for StandardsISO) seven-level (OSI) reference model. Meer
Cryptology is the art and science of secure communication over insecure channels. The primary aim of this book is to provide a self-contained overview of recent cryptologic achievements and techniques in a form that can be understood by readers having no previous acquaintance with cryptology. Meer
This volume consists of six essays that develop and/or apply "rational expectations equilibrium inventory models" to study the time series behavior of production, sales, prices, and inventories at the industry level. Meer
A System V Guide to UNIX and XENIX takes the novice reader through the features of the UNIX system step-by-step without jargon and assumptions about the reader's technical knowledge found in similar books. Meer
Dr AIvy Ray Smith Executive Vice President, Pixar The pOlyglot language of computer animation has arisen piecemeal as a collection of terms borrowed from geometry, film, video, painting, conventional animation, computer graphiCS, computer science, and publishing - in fact, from every older art or science which has anything to do with pictures and picture making. Meer
Here is a presentation of LISP which is both practical and theoretical. For the practical, the syntax of the language, the programming styles, and the semantics of computation are carefully developed. Meer
Analytics and artificial intelligence (AI), what are they good for? The bandwagon keeps answering, absolutely everything! Analytics and artificial intelligence have captured the attention of everyone from top executives to the person in the street. Meer
Welcome Sun users. This guide will be your key to understanding your Sun workstation. Within these pages you will find out how to use all of the basic functions and capabilities in a minimal amount of time. Meer
CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series under the name of EUROCRYPT. Meer
The Programmer's Hierarchical Interactive Graphics System (PHIGS) is a computer-graphics standard defining an interface between an application program and a computer-graphics system. Meer
Today one of the hardest parts of computer aided design or analysis is first modeling the design, then recording and verifying it. For example, a typical vehicle such as a tank, automobile, ship or aircraft might be composed of tens of thousands of individual parts. Meer
This book presents the Android plug-in technology used in Android development. This technology is widely used by a majority of Chinese internet companies, and is becoming more widely used worldwide. Meer
Many commercial and defense applications require a database system that protects data of different sensitivities while still allowing users of different clearances to access the system. Meer
The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. Meer
Argumentation is all around us. Letters to the Editor often make points of cons- tency, and “Why” is one of the most frequent questions in language, asking for r- sons behind behaviour. Meer
Social networking has increased drastically in recent years, resulting in an increased amount of data being created daily. Furthermore, diversity of issues and complexity of the social networks pose a challenge in social network mining. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books