This work is intended to be a guide for cardiologists unfamiliar with artificial intelligence, as well as for engineers and data scientists unfamiliar with cardiology.
This book discovers peer-reviewed research from an international research conference that unites experts in software engineering, data science, artificial intelligence, cybernetics, and informatics.
This book constitutes the refereed proceedings of the 18th International Conference on Artificial General Intelligence, AGI 2025, held in Reykjavic, Iceland in August 2025.
The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14–17, 2024.
The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14–17, 2024.
The two-volume set CCIS 2617 and 2618 constitutes the refereed post-conference proceedings of the 5th International Conference on Optimization, Learning Algorithms and Applications, OL2A 2025, held in Sesti Levante, Italy, during April 28–30, 2025.
The two-volume set CCIS 2617 and 2618 constitutes the refereed post-conference proceedings of the 5th International Conference on Optimization, Learning Algorithms and Applications, OL2A 2025, held in Sesti Levante, Italy, during April 28–30, 2025.
This book constitutes the refereed proceedings of the 11th International Conference on Rigorous State-Based Methods, ABZ 2025, held in Düsseldorf, Germany, during June 10–13, 2025.
The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14–17, 2024.
This book guides readers from the foundations of quantum mechanics through advanced quantum algorithms (such as Shor’s and Grover’s) and state-of-the-art machine learning methods.
This book constitutes the refereed proceedings of the 18th International Conference on Artificial General Intelligence, AGI 2025, held in Reykjavic, Iceland in August 2025.
The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14–17, 2024.
The two-volume set CCIS 2617 and 2618 constitutes the refereed post-conference proceedings of the 5th International Conference on Optimization, Learning Algorithms and Applications, OL2A 2025, held in Sesti Levante, Italy, during April 28–30, 2025.
This book discovers peer-reviewed research from an international research conference that unites experts in software engineering, data science, artificial intelligence, cybernetics, and informatics.
This book constitutes the proceedings of the 25th International Symposium on Fundamentals of Computation Theory, FCT 2025, held in Wroclaw, Poland, during September 15–17, 2025.
The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14–17, 2024.
This book constitutes the proceedings of the 25th International Symposium on Fundamentals of Computation Theory, FCT 2025, held in Wroclaw, Poland, during September 15–17, 2025.
This book contains extended versions of the works and new research results presented at the 15th International Conference on Artificial Intelligence-empowered Software Engineering (AIESE2024, formerly Joint Conference on Knowledge-based Software Engineering, JCKBSE), University of Piraeus, August 27–30, 2024, Greece.
The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14–17, 2024.
El problema de programacion de rutas en una empresa de transporte generalmente considera varios escenarios de distribucion de bienes los cuales, a su vez, constituyen diferentes grados de complejidad en su programacion.
Fully updated for Android Studio Flamingo, this book aims to teach you how to develop Android-based applications using the Kotlin programming language.
In this comprehensive reference work for researchers, engineers, and students, Kawahara provides a one-stop exploration of next-generation computing at the LSI circuit level, with a focus on the integration of AI, advanced LSI design, Ising machines, and memory innovations.
This second edition introduces Python programming to readers with little or no prior experience, specifically tailored for physicists and natural sciences students.
Fully updated for Android Studio Chipmunk, the goal of this book is to teach the skills necessary to develop Android-based applications using the Kotlin programming language.
Fully updated for Android Studio Arctic Fox, the goal of this book is to teach the skills necessary to develop Android-based applications using the Kotlin programming language.
Fully updated for Android Studio Arctic Fox, the goal of this book is to teach the skills necessary to develop Android-based applications using the Java programming language.
Fully updated for Android Studio Bumble Bee, the goal of this book is to teach the skills necessary to develop Android-based applications using the Kotlin programming language.
This book offers an extensive guide to understanding, implementing, and applying the Bees Algorithm, a powerful nature-inspired optimisation metaheuristic that mimics the foraging behaviour of honey bees.
This book offers an extensive guide to understanding, implementing, and applying the Bees Algorithm, a powerful nature-inspired optimisation metaheuristic that mimics the foraging behaviour of honey bees.
This book lays a systematic foundation for professionals, researchers, and industry readers who are interested the applications and implications of generative AI for cybersecurity.