Interoperability has been a requirement in NATO ever since the Alliance came into being - an obvious requirement when 16 independent Nations agree to allocate national resources for the achievement of a common goal: to maintain peace. Meer
Optimization is of central concern to a number of discip lines. Operations Research and Decision Theory are often consi dered to be identical with optimizationo But also in other areas such as engineering design, regional policy, logistics and many others, the search for optimal solutions is one of the prime goals. Meer
The year 1992 marks the centennial anniversary of publication of the celebrated monograph "The General Problem of Stability of Motion" written by A. M. Meer
This book presents recent advances in robot control theory on task space sensory feedback control of robot manipulators. By using sensory feedback information, the robot control systems are robust to various uncertainties in modelling and calibration errors of the sensors. Meer
This book is on the iterative learning control (ILC) with focus on the design and implementation. We approach the ILC design based on the frequency domain analysis and address the ILC implementation based on the sampled data methods. Meer
As the first to focus on the issue of Data Warehouse Requirements Engineering, this book introduces a model-driven requirements process used to identify requirements granules and incrementally develop data warehouse fragments. Meer
This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10–11, 2016 at Lavasa, Pune, Maharashtra, India. Meer
This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10–11, 2016 at Lavasa, Pune, Maharashtra, India. Meer
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Meer
This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Meer
This monograph describes the latest advances in discriminative learning methods for biometric recognition. Specifically, it focuses on three representative categories of methods: sparse representation-based classification, metric learning, and discriminative feature representation, together with their applications in palmprint authentication, face recognition and multi-biometrics. Meer
The subject of the book is to present the modeling, parameter estimation and other aspects of the identification of nonlinear dynamic systems. The treatment is restricted to the input-output modeling approach. Meer
This book constitutes the refereed proceedings of the 4th International Symposium on Advances in Signal Processing and Intelligent Recognition Systems, SIRS 2018, held in Bangalore, India, in September 2018. Meer
This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018. Meer
This brief provides a broad overview of protein-engineering research, offering a glimpse of the most common experimental methods. It also presents various computational programs with applications that are widely used in directed evolution, computational and de novo protein design. Meer
This book explains how to use a data-driven approach to design strategies for social media content delivery. It first introduces readers to how social information can be effectively gathered for big data analysis, which provides content delivery intelligence. Meer
This book provides a comprehensive overview of the exact boundary controllability of nodal profile, a new kind of exact boundary controllability stimulated by some practical applications. Meer
The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA 2016) held at School of Computer Engineering, KIIT University, Bhubaneswar, India during 16 - 17 September 2016. Meer
This book constitutes the refereed proceedings of the 20th CCF Conference on Computer Engineering and Technology, NCCET 2016, held in Xi'an, China, in August 2016. Meer
This book constitutes the refereed proceedings of the first China Conference on Knowledge Graph and Semantic Computing, CCKS, held in Beijing, China, in September 2016. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books