0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (362)
  • R250 - R500 (937)
  • R500+ (14,134)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Computational Intelligence for Traffic and Mobility (Hardcover, 2013 ed.): Wuhong Wang, Geert Wets Computational Intelligence for Traffic and Mobility (Hardcover, 2013 ed.)
Wuhong Wang, Geert Wets
R3,313 R1,996 Discovery Miles 19 960 Save R1,317 (40%) Ships in 12 - 17 working days

This book presents the new development of computation intelligence for traffic, transportation and mobility, the main contents include traffic safety, mobility analysis, intelligent transportation system, smart vehicle, transportation behavior, driver modeling and assistance, transportation risk analysis and reliability system analysis, vehicle operation and active safety, urban traffic management and planning.

Handbook of Distributed Sensor Networks: Volume I (Hardcover): Marvin Heather Handbook of Distributed Sensor Networks: Volume I (Hardcover)
Marvin Heather
R2,921 Discovery Miles 29 210 Ships in 12 - 17 working days
The Real MCTS/MCITP Exam 70-643 Prep Kit - Independent and Complete Self-Paced Solutions (Paperback, New): Brien Posey, Colin... The Real MCTS/MCITP Exam 70-643 Prep Kit - Independent and Complete Self-Paced Solutions (Paperback, New)
Brien Posey, Colin Bowern, Jeffery A. Martin, John Karnay, Arno Theron, …
R1,830 Discovery Miles 18 300 Ships in 12 - 17 working days

This exam is designed to validate Windows Server 2008 applications platform configuration skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-643.
The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers.
MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management.
In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.
* Addresses both newcomers to MS certification, and those who are upgrading from Windows 2003.
* Two full-function ExamDay practice exams guarantee double coverage of all exam objectives
* Free download of audio FastTracks for use with iPods or other MP3 players
* THE independent source of exam-day tips, techniques, and warnings not available from Microsoft
* Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives
* Interactive FastTrack e-learning modules help simplify difficult exam topics

Science Gateways for Distributed Computing Infrastructures - Development Framework and Exploitation by Scientific User... Science Gateways for Distributed Computing Infrastructures - Development Framework and Exploitation by Scientific User Communities (Hardcover, 2014 ed.)
Peter Kacsuk
R3,845 R3,405 Discovery Miles 34 050 Save R440 (11%) Ships in 12 - 17 working days

The book describes the science gateway building technology developed in the SCI-BUS European project and its adoption and customization method, by which user communities, such as biologists, chemists, and astrophysicists, can build customized, domain-specific science gateways. Many aspects of the core technology are explained in detail, including its workflow capability, job submission mechanism to various grids and clouds, and its data transfer mechanisms among several distributed infrastructures. The book will be useful for scientific researchers and IT professionals engaged in the development of science gateways.

Elastic Load Balancing Classic Load Balancers (Hardcover): Documentation Team Elastic Load Balancing Classic Load Balancers (Hardcover)
Documentation Team
R1,195 Discovery Miles 11 950 Ships in 10 - 15 working days
Managing Cisco Network Security (Paperback, 2nd edition): Syngress Managing Cisco Network Security (Paperback, 2nd edition)
Syngress
R1,635 Discovery Miles 16 350 Ships in 12 - 17 working days

An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world
"There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security Consulting
Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.

Security from a real-world perspective
Key coverage of the new technologies offered by the Cisco including: 500 series of Cisco PIX Firewall, Cisco Intrusion Detection System, and the Cisco Secure Scanner
Revised edition of a text popular with CCIP (Cisco Certified Internetwork Professional) students
Expanded to include separate chapters on each of the security products offered by Cisco Systems

Advances in Communication, Devices and Networking - Proceedings of ICCDN 2019 (Hardcover, 1st ed. 2020): Rabindranath Bera,... Advances in Communication, Devices and Networking - Proceedings of ICCDN 2019 (Hardcover, 1st ed. 2020)
Rabindranath Bera, Prashant Chandra Pradhan, Chuan-Ming Liu, Sourav Dhar, Samarendra Nath Sur
R5,530 Discovery Miles 55 300 Ships in 10 - 15 working days

This book covers recent trends in the field of devices, wireless communication and networking. It gathers selected papers presented at the International Conference on Communication, Devices and Networking (ICCDN 2019), which was organized by the Department of Electronics and Communication Engineering, Sikkim Manipal Institute of Technology, Sikkim, India, on 9-10 December 2019. Gathering cutting-edge research papers prepared by researchers, engineers and industry professionals, it will help young and experienced scientists and developers alike to explore new perspectives, and offer them inspirations on how to address real-world problems in the areas of electronics, communication, devices and networking.

OSS Design Patterns - A Pattern Approach to the Design of Telecommunications Management Systems (Hardcover, 2009 ed.): Colin... OSS Design Patterns - A Pattern Approach to the Design of Telecommunications Management Systems (Hardcover, 2009 ed.)
Colin Ashford, Pierre Gauthier
R1,458 Discovery Miles 14 580 Ships in 10 - 15 working days

The management of telecommunications networks and services is one of the most challenging of software endeavors-partly because of the size and the distributed nature of networks; partly because of the convergence of communications techno- gies; but mainly because of sheer complexity and diversity of networks and services. The TM Forum s Solutions Frameworks (NGOSS) help address these challenges by providing a framework for the development of management applications-those software applications that provide the building blocks for management solutions. The members of the TM Forum have elaborated many parts of NGOSS to make it practical-including in the area of information modeling, process analysis, and c- tract de?nition. This book further elaborates NGOSS by examining the challenging area of interface design. One of the costs of deploying a new service is the cost of integrating all the necessary applications into an effective software solution to manage the service. This cost has been dubbed the "integration tax" and can turn out to be ?ve times the capital cost of procuring the management software in the ?rst place. From their long experience of the design and standardization of management applications, the authors have extracted a core set of design patterns for the dev- opment of effective and consistent interfaces to management applications. Adopting these patterns across the industry could reduce the learning curve for software - velopers and allow service providers and systems integrators to rapidly and reliably deploy management solutions and thereby markedly reduce the integration tax.

Microsoft Log Parser Toolkit - A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool (Paperback): Gabriele... Microsoft Log Parser Toolkit - A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool (Paperback)
Gabriele Giuseppini, Mark Burnett
R1,225 Discovery Miles 12 250 Ships in 12 - 17 working days

HIGHLIGHT
Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products.
System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware devices (firewalls, routers, etc.) that generate incredibly long and detailed log files of all activity on the particular application or device. This book will teach administrators how to use Microsoft's Log Parser to data mine all of the information available within these countless logs. The book teaches readers how all queries within Log Parser work (for example: a Log Parser query to an Exchange log may provide information on the origin of spam, viruses, etc.). Also, Log Parser is completely scriptable and customizable so the book and accompanying Web site will provide the reader with hundreds of original, working scripts that will automate these tasks and provide formatted charts and reports detailing the results of the queries.
* Written by Microsoft's sole developer of Log Parser, this is the first book available on the powerful yet completely undocumented product that ships with Microsoft's IIS, Windows Advanced Server 2003, and is available as a free download from the
Microsoft Web site.
* The book and accompanying Web site contain dozens of original, working Log Parser scripts and templates for Windows Server, ISA Server, Snort IDS, Exchange Server, IIS, and more
* This book and accompanying scripts will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks.

Advances in Neural Networks: Computational and Theoretical Issues (Hardcover, 2015 ed.): Simone Bassis, Anna Esposito,... Advances in Neural Networks: Computational and Theoretical Issues (Hardcover, 2015 ed.)
Simone Bassis, Anna Esposito, Francesco Carlo Morabito
R2,888 Discovery Miles 28 880 Ships in 10 - 15 working days

This book collects research works that exploit neural networks and machine learning techniques from a multidisciplinary perspective. Subjects covered include theoretical, methodological and computational topics which are grouped together into chapters devoted to the discussion of novelties and innovations related to the field of Artificial Neural Networks as well as the use of neural networks for applications, pattern recognition, signal processing, and special topics such as the detection and recognition of multimodal emotional expressions and daily cognitive functions, and bio-inspired memristor-based networks. Providing insights into the latest research interest from a pool of international experts coming from different research fields, the volume becomes valuable to all those with any interest in a holistic approach to implement believable, autonomous, adaptive and context-aware Information Communication Technologies.

IT Convergence and Security 2017 - Volume 1 (Hardcover, 1st ed. 2018): Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek IT Convergence and Security 2017 - Volume 1 (Hardcover, 1st ed. 2018)
Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek
R6,243 Discovery Miles 62 430 Ships in 12 - 17 working days

This is the first volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in this field. It explores how IT convergence and security issues are core to most current research, and industrial and commercial activities. It consists of contributions covering topics such as machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics. ICITCS 2017 is the latest in a series of highly successful International Conferences on IT Convergence and Security, previously held in Prague, Czech Republic(2016), Kuala Lumpur, Malaysia (2015) Beijing, China (2014), Macau, China (2013), Pyeong Chang, Korea (2012), and Suwon, Korea (2011).

Information and Communication Technologies for Development - 16th IFIP WG 9.4 International Conference on Social Implications... Information and Communication Technologies for Development - 16th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2020, Manchester, UK, June 10-11, 2020, Proceedings (Hardcover, 1st ed. 2020)
Julian M. Bass, P.J. Wall
R1,485 Discovery Miles 14 850 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2020, which was supposed to be held in Salford, UK, in June 2020, but was held virtually instead due to the COVID-19 pandemic. The 18 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: digital platforms and gig economy; education and health; inclusion and participation; and business innovation and data privacy.

Autonomous Control for a Reliable Internet of Services - Methods, Models, Approaches, Techniques, Algorithms, and Tools... Autonomous Control for a Reliable Internet of Services - Methods, Models, Approaches, Techniques, Algorithms, and Tools (Hardcover)
Ivan Ganchev, R. D. van der Mei, Hans van den Berg
R1,695 Discovery Miles 16 950 Ships in 12 - 17 working days
Biometric Authentication in Online Learning Environments (Hardcover): A.V. Senthil Kumar Biometric Authentication in Online Learning Environments (Hardcover)
A.V. Senthil Kumar
R5,103 Discovery Miles 51 030 Ships in 12 - 17 working days

Student assessment in online learning is submitted remotely without any face-to-face interaction, and therefore, student authentication is widely seen as one of the major challenges in online examination. Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, especially within education, the need for authentication has increased. Biometric Authentication in Online Learning Environments provides innovative insights into biometrics as a strategy to mitigate risk and provide authentication, while introducing a framework that provides security to improve e-learning and on-line examination by utilizing biometric-based authentication techniques. This book examines e-learning, security, threats in online exams, security considerations, and biometric technologies, and is designed for IT professionals, higher education administrators, professors, researchers, business professionals, academicians, and libraries seeking topics centered on biometrics as an authentication strategy within educational environments.

Look-Ahead Based Sigma-Delta Modulation (Hardcover, 2011 Ed.): Erwin Janssen, Arthur Van Roermund Look-Ahead Based Sigma-Delta Modulation (Hardcover, 2011 Ed.)
Erwin Janssen, Arthur Van Roermund
R4,253 Discovery Miles 42 530 Ships in 10 - 15 working days

The aim of this book is to expand and improve upon the existing knowledge on discrete-time 1-bit look-ahead sigma-delta modulation in general, and to come to a solution for the above mentioned specific issues arising from 1-bit sigma-delta modulation for SA-CD. In order to achieve this objective an analysis is made of the possibilities for improving the performance of digital noise-shaping look-ahead solutions. On the basis of the insights obtained from the analysis, several novel generic 1-bit look-ahead solutions that improve upon the state-of-the-art will be derived and their performance will be evaluated and compared. Finally, all the insights are combined with the knowledge of the SA-CD lossless data compression algorithm to come to a specifically for SA-CD optimized look-ahead design.

.NET Mobile Web Developers Guide (Paperback): Syngress .NET Mobile Web Developers Guide (Paperback)
Syngress
R1,352 Discovery Miles 13 520 Ships in 12 - 17 working days

Introducing Microsoft's flagship wireless development tool
The .NET Mobile Web Developer's Guide will provide readers with a solid guide to developing mobile applications using Microsoft technologies. The focus of this book is on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform and goes into moderate details on ASP.NET to allow readers to start developing ASP.NET applications. In addition, this book will give the readers the insight to use the various Microsoft technologies for developing mobile applications.
This book assumes the readers have experience in developing web applications and are familiar with any one of the server-side technologies like ASP, JSP or PHP.
The first book available on Microsoft's cornerstone wireless development tool
Best selling, high profile authors. Wei Meng Lee and Shelley Powers are frequent speakers at all of the major developer conferences have previously authored best selling books for O'Reilly & Associates, Wrox Press, SAMS and Que
Comes with wallet-sized CD containing a printable HTML version of the book, all of the source code examples and demos of popular ASP .NET and .NET Mobile programming tools
Comprehensive Coverage of the .NET Mobile SDK and ASP.NET for Mobile Web developers

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques... Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques (Hardcover, 1st ed. 2021)
Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari
R4,587 Discovery Miles 45 870 Ships in 12 - 17 working days

Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.

Grid and Cloud Computing - A Business Perspective on Technology and Applications (Hardcover, 2010 ed.): Katarina Stanoevska,... Grid and Cloud Computing - A Business Perspective on Technology and Applications (Hardcover, 2010 ed.)
Katarina Stanoevska, Thomas Wozniak, Santi Ristol
R2,951 Discovery Miles 29 510 Ships in 10 - 15 working days

In today's dynamic business environment, IT departments are under permanent pressure to meet two divergent requirements: to reduce costs and to support business agility with higher flexibility and responsiveness of the IT infrastructure. Grid and Cloud Computing enable a new approach towards IT. They enable increased scalability and more efficient use of IT based on virtualization of heterogeneous and distributed IT resources. This book provides a thorough understanding of the fundamentals of Grids and Clouds and of how companies can benefit from them. A wide array of topics is covered, e.g. business models and legal aspects. The applicability of Grids and Clouds in companies is illustrated with four cases of real business experiments. The experiments illustrate the technical solutions and the organizational and IT governance challenges that arise with the introduction of Grids and Clouds. Practical guidelines on how to successfully introduce Grids and Clouds in companies are provided.

Cybersecurity Investments - Decision Support Under Economic Aspects (Hardcover, 1st ed. 2016): Stefan Beissel Cybersecurity Investments - Decision Support Under Economic Aspects (Hardcover, 1st ed. 2016)
Stefan Beissel
R1,499 Discovery Miles 14 990 Ships in 10 - 15 working days

This book offers readers essential orientation on cybersecurity safeguards, and first and foremost helps them find the right balance between financial expenditures and risk mitigation. This is achieved by pursuing a multi-disciplinary approach that combines well-founded methods from economics and the computer sciences. Established decision making techniques are embedded into a walk-through for the complete lifecycle of cybersecurity investments. Insights into the economic aspect of the costs and benefits of cybersecurity are supplemented by established and innovative economic indicators. Readers will find practical tools and techniques to support reasonable decision making in cybersecurity investments. Further, they will be equipped to encourage a common understanding using economic aspects, and to provide cost transparency for the senior management.

Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021): Wei Chang, Jie Wu Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021)
Wei Chang, Jie Wu
R3,963 Discovery Miles 39 630 Ships in 12 - 17 working days

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Novel Practices and Trends in Grid and Cloud Computing (Hardcover): Pethuru Raj, S Koteeswaran Novel Practices and Trends in Grid and Cloud Computing (Hardcover)
Pethuru Raj, S Koteeswaran
R6,664 Discovery Miles 66 640 Ships in 12 - 17 working days

Business and IT organizations are currently embracing new strategically sound concepts in order to be more customer-centric, competitive, and cognitive in their daily operations. While useful, the various software tools, pioneering technologies, as well as their unique contributions largely go unused due to the lack of information provided on their special characteristics. Novel Practices and Trends in Grid and Cloud Computing is a collection of innovative research on the key concerns of cloud computing and how they are being addressed, as well as the various technologies and tools empowering cloud theory to be participative, penetrative, pervasive, and persuasive. While highlighting topics including cyber security, smart technology, and artificial intelligence, this book is ideally designed for students, researchers, and business managers on the lookout for innovative IT solutions for all the business automation software and improvisations of computational technologies.

Darknet - A Beginner's Guide to Staying Anonymous Online (Paperback): Lance Henderson Darknet - A Beginner's Guide to Staying Anonymous Online (Paperback)
Lance Henderson
R272 Discovery Miles 2 720 Ships in 10 - 15 working days
Artificial Organic Networks - Artificial Intelligence Based on Carbon Networks (Hardcover, 2014 ed.): Hiram Ponce Espinosa,... Artificial Organic Networks - Artificial Intelligence Based on Carbon Networks (Hardcover, 2014 ed.)
Hiram Ponce Espinosa, Pedro Ponce-Cruz, Arturo Molina
R4,347 R3,344 Discovery Miles 33 440 Save R1,003 (23%) Ships in 12 - 17 working days

This monograph describes the synthesis and use of biologically-inspired artificial hydrocarbon networks (AHNs) for approximation models associated with machine learning and a novel computational algorithm with which to exploit them. The reader is first introduced to various kinds of algorithms designed to deal with approximation problems and then, via some conventional ideas of organic chemistry, to the creation and characterization of artificial organic networks and AHNs in particular.

The advantages of using organic networks are discussed with the rules to be followed to adapt the network to its objectives. Graph theory is used as the basis of the necessary formalism. Simulated and experimental examples of the use of fuzzy logic and genetic algorithms with organic neural networks are presented and a number of modeling problems suitable for treatment by AHNs are described:

. approximation;

. inference;

. clustering;

. control;

. classification; and

. audio-signal filtering.

The text finishes with a consideration of directions in which AHNs could be implemented and developed in future. A complete LabVIEW toolkit, downloadable from the book s page at springer.com enables readers to design and implement organic neural networks of their own.

The novel approach to creating networks suitable for machine learning systems demonstrated in "Artificial Organic Networks" will be of interest to academic researchers and graduate students working in areas associated with computational intelligence, intelligent control, systems approximation and complex networks."

Intelligence Science III - 4th IFIP TC 12 International Conference, ICIS 2020, Durgapur, India, February 24-27, 2021, Revised... Intelligence Science III - 4th IFIP TC 12 International Conference, ICIS 2020, Durgapur, India, February 24-27, 2021, Revised Selected Papers (Hardcover, 1st ed. 2021)
Zhongzhi Shi, Mihir Chakraborty, Samarjit Kar
R1,510 Discovery Miles 15 100 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 4th International Conference on Intelligence Science, ICIS 2020, held in Durgapur, India, in February 2021 (originally November 2020). The 23 full papers and 4 short papers presented were carefully reviewed and selected from 42 submissions. One extended abstract is also included. They deal with key issues in brain cognition; uncertain theory; machine learning; data intelligence; language cognition; vision cognition; perceptual intelligence; intelligent robot; and medical artificial intelligence.

Handbook of Computer Networks and Communications: Volume II (Hardcover): Akira Hanako Handbook of Computer Networks and Communications: Volume II (Hardcover)
Akira Hanako
R2,923 Discovery Miles 29 230 Ships in 12 - 17 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,525 Discovery Miles 65 250
The Gathering Cloud
J. R. Carpenter Paperback R361 Discovery Miles 3 610
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,631 Discovery Miles 56 310
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,212 R1,121 Discovery Miles 11 210
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain Hardcover R8,415 Discovery Miles 84 150
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,256 Discovery Miles 62 560

 

Partners