0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018): Muhammad... Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018)
Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum
R1,471 Discovery Miles 14 710 Ships in 10 - 15 working days

This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.

Codes, Cryptology and Curves with Computer Algebra (Hardcover): Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius Codes, Cryptology and Curves with Computer Algebra (Hardcover)
Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius
R4,329 Discovery Miles 43 290 Ships in 12 - 17 working days

This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined. This book is designed for Masters-level students studying mathematics, computer science, electrical engineering or physics.

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Paperback, Softcover reprint of... Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Paperback, Softcover reprint of the original 1st ed. 2018)
Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.

Codes, Cryptology and Curves with Computer Algebra (Paperback): Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius Codes, Cryptology and Curves with Computer Algebra (Paperback)
Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius
R1,704 Discovery Miles 17 040 Ships in 12 - 17 working days

This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined. This book is designed for Masters-level students studying mathematics, computer science, electrical engineering or physics.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Northman
Alexander Skarsgard, Nicole Kidman, … Blu-ray disc  (1)
R210 Discovery Miles 2 100
Dala A2 Sketch Pad (120gsm)(36 Sheets)
R260 Discovery Miles 2 600
Loot
Nadine Gordimer Paperback  (2)
R205 R164 Discovery Miles 1 640
Home Classix Double Wall Tumbler (360ml…
R89 R73 Discovery Miles 730
ZA Key ring - Blue
R199 Discovery Miles 1 990
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter Paperback R150 R117 Discovery Miles 1 170
Loot
Nadine Gordimer Paperback  (2)
R205 R164 Discovery Miles 1 640
Holy Fvck
Demi Lovato CD R414 Discovery Miles 4 140
Playstation 4 Replacement Case
 (9)
R54 Discovery Miles 540
Canon 445 Original Ink Cartridge (Black)
R700 R335 Discovery Miles 3 350

 

Partners