Dieses Buch beschreibt eine Reihe von SystemC-basierten Analysemethoden für virtuelle Prototypen, einschließlich Entwurfsverständnis, Verifikation, Sicherheitsvalidierung und Entwurfsraumuntersuchung.
The book titled "e;Applications of Computational Intelligence Techniques in Communications"e; is a one-stop platform for the researchers, academicians, and people from industry to get a thorough understanding of the latest research in the field of communication engineering.
Dieses Buch beschreibt eine neue, grobkörnige rekonfigurierbare Architektur (CGRA), genannt Blocks, und stellt sie in den Kontext von Computerarchitekturen und insbesondere von anderen CGRAs.
Clifford algebra for dual quaternions has emerged recently as an alternative to standard matrix algebra as a computational framework for computer graphics.
We are living in the digital age: from ordering products & services to studying and booking travel, digital solutions are everywhere we go and in everything we do.
Fast data ingestion, serving, and analytics in the Hadoop ecosystem have forced developers and architects to choose solutions using the least common denominatoreither fast analytics at the cost of slow data ingestion or fast data ingestion at the cost of slow analytics.
Fast data ingestion, serving, and analytics in the Hadoop ecosystem have forced developers and architects to choose solutions using the least common denominatoreither fast analytics at the cost of slow data ingestion or fast data ingestion at the cost of slow analytics.
Embedded systems and the Internet of Things are current major efforts in industry and will continue to be mainstream commercial activities for the foreseeable future.
The use of data communications and computer networks is constantly increasing, bringing benefits to most of the countries and peoples of the world, and serving as the lifeline of industry.
The use of data communications and computer networks is constantly increasing, bringing benefits to most of the countries and peoples of the world, and serving as the lifeline of industry.
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security.
As the world enters the era of big data, there is a serious need to give a semantic perspective to the data in order to find unseen patterns, derive meaningful information, and make intelligent decisions.
As the world enters the era of big data, there is a serious need to give a semantic perspective to the data in order to find unseen patterns, derive meaningful information, and make intelligent decisions.
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security.
Kickstart your emotion analysis journey with this step-by-step guide to data science successKey FeaturesDiscover the inner workings of the end-to-end emotional analysis workflowExplore the use of various ML models to derive meaningful insights from dataHone your craft by building and tweaking complex emotion analysis models with practical projectsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionArtificial intelligence and machine learning are the technologies of the future, and this is the perfect time to tap into their potential and add value to your business.
This book explores the applications and advancements of federated learning across diverse sectors, focusing on its integration with cutting- edge technologies like Internet of Things (IoT), artificial intelligence (AI), blockchain, and digital twins.
This book studies the evolution of sustainable green smart cities and demonstrates solutions for green environmental issues using modern industrial IoT solutions.
Start from scratch and develop the essential skills needed to create, deploy, and manage cloud-native applications using Docker with the latest edition of Docker Deep DiveKey FeaturesGet a solid understanding of Docker and containersOvercome common problems while containerizing an applicationMaster Docker commands needed for creating, deploying, and running applicationsBook DescriptionMost applications, even the funky cloud-native microservices ones, need high-performance, production-grade infrastructure to run on.
Unmatched: 50 Years of Supercomputing: A Personal Journey Accompanying the Evolution of a Powerful ToolThe rapid and extraordinary progress of supercomputing over the past half-century is a powerful demonstration of our relentless drive to understand and shape the world around us.
This book explores quantum computing as a transformative technology and its applications in cryptography, teleportation, IoT, AI, Blockchain, and the futurist concept of quantum internet.
Unmatched: 50 Years of Supercomputing: A Personal Journey Accompanying the Evolution of a Powerful ToolThe rapid and extraordinary progress of supercomputing over the past half-century is a powerful demonstration of our relentless drive to understand and shape the world around us.
This book explores quantum computing as a transformative technology and its applications in cryptography, teleportation, IoT, AI, Blockchain, and the futurist concept of quantum internet.
Computational Intelligence in Urban Infrastructure consolidates experiences and research results in computational intelligence and its applications in urban infrastructure.
Computational Intelligence in Urban Infrastructure consolidates experiences and research results in computational intelligence and its applications in urban infrastructure.
Become a security automation expert and build solutions that save time while making your organization more secureKey FeaturesWhat's insideAn exploration of the SOAR platform's full features to streamline your security operationsLots of automation techniques to improve your investigative abilityActionable advice on how to leverage the capabilities of SOAR technologies such as incident management and automation to improve security postureBook DescriptionWhat your journey will look likeWith the help of this expert-led book, you ll become well versed with SOAR, acquire new skills, and make your organization's security posture more robust.