This book provides a comprehensive understanding of how intelligent data-driven techniques can be used for modelling, controlling, and optimizing various power and energy applications.
This book provides a comprehensive understanding of how intelligent data-driven techniques can be used for modelling, controlling, and optimizing various power and energy applications.
Artificial intelligence advancements, machine intelligence innovations, and semantic web developments together make up semantic intelligence technologies.
The fifth edition of this core textbook in advanced remote sensing continues to maintain its emphasis on statistically motivated, data-driven techniques for remote sensing image analysis.
This book will highlight cutting-edge research with a particular emphasis on interdisciplinary approaches, novel techniques, and solutions to provide digital image security for applications in diverse areas.
This book is about how to design the most complex types of digital circuit boards used inside servers, routers and other equipment, from high-level system architecture down to the low-level signal integrity concepts.
This book is about how to design the most complex types of digital circuit boards used inside servers, routers and other equipment, from high-level system architecture down to the low-level signal integrity concepts.
An utterly absorbing account of humans, computers, and how much they differ Dame Diane Coyle, author of Cogs and MonstersWhat does Artificial Intelligence mean for our identity?
Blender 2D Animation: The Complete Guide to the Grease Pencil, Second Edition describes how to access the Grease Pencil component in Blender and create 2D animation within the Blender 3D environment.
By imparting crucial insights into the digital evolution of far-right extremism and its challenges, this book explores how far-right extremism has transformed, utilising digital spaces for communication and employing coded language to evade detection.
This book constitutes the refereed proceedings of the Second International Conference on Future Network Systems and Security, FNSS 2016, held in Paris, France, in November 2016.
This book goes beyond the current hype of expectations generated by the news on artificial intelligence and machine learning by analyzing realistic expectations for society, its limitations, and possible future scenarios for the use of this technology in our current society.
This book goes beyond the current hype of expectations generated by the news on artificial intelligence and machine learning by analyzing realistic expectations for society, its limitations, and possible future scenarios for the use of this technology in our current society.
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities.
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities.
*MAKE VISUAL DETOXING YOUR NEW YEAR S RESOLUTION FOR 2025*'This book is the new Ways of Seeing' Sharmadean Reid | 'Necessary reading for everyone who uses the internet' Emma Dabiri |'Brilliant insights .
Step Into a Brighter Future for Our Children: Navigating the Digital LandscapeIn a world increasingly dominated by screens, how do we safeguard the innocence of childhood and the mental well-being of our next generation?
Cognitive computing simulates human thought processes with self-learning algorithms that utilize data mining, pattern recognition, and natural language processing.
In BLACK MEME, Legacy Russell, awardwinning author of the groundbreaking GLITCH FEMINISM, explores the "e;meme"e; as mapped to Black visual culture from 1900 to the present, mining both archival and contemporary media.
As the complexity and importance of web activity multiplies, the success of any endeavor depends on utilizing the most advanced intelligent techniques when designing tools for the modern age.
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection.
Describing state-of-the-art solutions in distributed system architectures, Integration of Services into Workflow Applications presents a concise approach to the integration of loosely coupled services into workflow applications.
Capable of acquiring large volumes of data through sensors deployed in air, land, and sea, and making this information readily available in a continuous time frame, the science of geographical information system (GIS) is rapidly evolving.
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.
Shadow Algorithms Data Miner provides a high-level understanding of the complete set of shadow concepts and algorithms, addressing their usefulness from a larger graphics system perspective.