0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018): Muhammad... Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018)
Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum
R1,410 Discovery Miles 14 100 Ships in 18 - 22 working days

This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.

Codes, Cryptology and Curves with Computer Algebra (Hardcover): Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius Codes, Cryptology and Curves with Computer Algebra (Hardcover)
Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius
R4,663 Discovery Miles 46 630 Ships in 10 - 15 working days

This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined. This book is designed for Masters-level students studying mathematics, computer science, electrical engineering or physics.

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Paperback, Softcover reprint of... Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Paperback, Softcover reprint of the original 1st ed. 2018)
Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.

Codes, Cryptology and Curves with Computer Algebra (Paperback): Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius Codes, Cryptology and Curves with Computer Algebra (Paperback)
Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius
R1,871 Discovery Miles 18 710 Ships in 10 - 15 working days

This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined. This book is designed for Masters-level students studying mathematics, computer science, electrical engineering or physics.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Truly Devious Trilogy - Truly Devious…
Maureen Johnson Paperback R1,030 R639 Discovery Miles 6 390
Uncle Wiggily in Wonderland
Howard Roger 1873-1962 Garis Hardcover R828 Discovery Miles 8 280
Karcher FP 303 - Floor Care For…
R349 Discovery Miles 3 490
Complementary and Alternative Medicine…
Ali Keshavarzian, Ece A. Mutlu Hardcover R1,941 Discovery Miles 19 410
The Monkey King Makes Fire on Black Wind…
Wu Ch'eng-en Hardcover R592 R541 Discovery Miles 5 410
Habits of Hope - A Pragmatic Theory
Patrick Shade Hardcover R1,065 Discovery Miles 10 650
Anatomy - A Love Story
Dana Schwartz Paperback R319 R291 Discovery Miles 2 910
The Irony of Heidegger
Andrew Haas Hardcover R4,950 Discovery Miles 49 500
101 Water Wise Ways
Helen Moffett Paperback  (1)
R150 R139 Discovery Miles 1 390
Tokyo Ever After
Emiko Jean Paperback R261 R238 Discovery Miles 2 380

 

Partners