Providing an in-depth discussion of emoji use in a global context, this volume presents the use of emoji as a hugely imp......more
This is a clear, accessible manual of storytelling techniques and learning activities for spatial computing and mixed re......more
This is a clear, accessible manual of storytelling techniques and learning activities for spatial computing, augmented r......more
This book comprehensively discusses nature-inspired algorithms, deep learning methods, applications of mathematical prog......more
The book discusses nature-inspired algorithms, deep learning methods, applications of mathematical programming, and arti......more
This comprehensive guide seamlessly bridges the gap between theoretical concepts and practical implementations, providin......more
The information security arena is often vague and confusing for internet users and fallling into cyber traps can take et......more
This book presents insights on digital transformation with a multidisciplinary lens. Collecting chapters from several ma......more
With rapid advancements in AI, this book reveals how AI can be a powerful tool in reducing pollution and fostering susta......more
The book offers a modern exploration of the intersection of technology and education. It examines the prospects of integ......more
Title: Bjarne Stroustrup: A Journey Through Programming and InnovationSummary: Discover the remarkable life and influent......more
"Generative AI, Cyber Security, and Ethics’ is an essential guide for students, providing clear explanations and practic......more
"Before feeding data into a machine-learning model, it is "vectorized" -- converted into numbers representing a point or......more
Game narrative and UX share a deep, interconnected relationship. This book explores the connections between narrative an......more
Game narrative and UX share a deep, interconnected relationship. This book explores the connections between narrative an......more
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively......more
Key elements in the formation of smart cities are development based on cooperation between local governments and busines......more
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively......more
This book is a study of the psychology, neuroscience, and philosophy of creativity, originality, and inspiration viewed ......more
This book is a study of the psychology, neuroscience, and philosophy of creativity, originality, and inspiration viewed ......more
By finding and building around a strong core mechanism, we can access new levels of elegance and discover fresh new idea......more
By finding and building around a strong core mechanism, we can access new levels of elegance and discover fresh new idea......more
This book provides a thorough exploration of the intersection between gender-based healthcare disparities and the transf......more
Cloud and Fog Optimization-based Solutions for Sustainable Developments discusses the integration of fog computing and t......more
Digital evolution, whether through Internet advances or the development of connected objects, has triggered a veritable ......more
The aim of this book is to delineate the challenges faced by new generation mobile networks, such as 5G and forthcoming ......more
This concise and accessible guide equips readers with the knowledge and skills needed to implement digital control algor......more
This is an essential resource for beginners and experienced practitioners in machine learning. This comprehensive guide ......more
Interactive Sound and Music: Beyond Pressing Play provides an accessible exploration into the aesthetics of interactive ......more
Interactive Sound and Music: Beyond Pressing Play provides an accessible exploration into the aesthetics of interactive ......more
In Creating the World Wide Web: The Story of Tim Berners-Lee, follow the journey of Tim Berners-Lee as he pioneers the b......more
Ransomware is a type of malicious software that prevents victims from accessing their computers and the information they......more
Discover the captivating journey of Guido van Rossum, the creator of Python, in this in-depth biography. From his early ......more
Introduction to Mathematical Modeling and Computer Simulations, Second Edition continues to serve as an engaging and acc......more
Uncovering the life of legendary programmer Alan Cox, Jennifer Lawrence takes readers on a captivating journey through h......more
Discover the fascinating life and influential work of computer pioneer Dennis Ritchie in this captivating book. From his......more
Turn challenges into opportunities by mastering advanced techniques for text generation, summarization, and question ans......more
Become an MDI expert and transform your IT security with advanced identity protection strategies to safeguard against ev......more
Gain a holistic understanding of AUTOSAR concepts, from BSW and RTE integration to communication, security, and diagnost......more
...more
Critical Data Studies has come of age as a vibrant, interdisciplinary field of study. Taking data as its primary analyti......more
This book provides a comprehensive overview of the latest advancements and research in the fields of computing and intel......more
This book provides a comprehensive overview of the latest advancements and research in the fields of computing and intel......more
...more
...more
...more
...more
Artificial Intelligence-Based 6G Networking focuses exclusively on the upcoming sixth-generation (6G) network and servic......more
Artificial Intelligence-Based 6G Networking focuses exclusively on the upcoming sixth-generation (6G) network and servic......more
This book presents cutting-edge research, advanced techniques, and practical applications of the integration of Cloud Co......more
This is the first of two volumes forming a definitive guide to databases in geotechnical and rock engineering to enhance......more
This is the second of a definitive guide to databases in geotechnical and rock engineering to enhance decision-making in......more
Intelligence in Chips: Integrated Sensors and Memristive Computing is an authoritative resource that navigates the excit......more
Provides a comprehensive analysis of the tools and techniques used for the development of efficient and robust decentral......more
This book presents dual quaternions and their associated Clifford algebras in a new light, accessible to and geared towa......more
Applying Color Theory to Digital Media and Visualization provides an overview of the application of color theory concept......more
Applying Color Theory to Digital Media and Visualization provides an overview of the application of color theory concept......more
New to programming and JavaScript? Look no further! With this beginner’s guide, learn the language ABCs and start develo......more
The book emphasizes the role of data in driving healthcare transformation, providing readers with a roadmap for understa......more
"Ready to make the most of your SAP Analytics Cloud applications? Learn to develop, deploy, and monitor custom analytica......more
This book shows how diverse data models and web technologies can be created and used for the built environment. This boo......more
This book explores and offers an overview of knowledge management embraced in the current scenario of Society 5.0, shedd......more
Learn, prepare, and practice for CompTIA Network+ N10-009 exam success with this Cert Guide from Pearson IT Certificatio......more
"Put quality first with QM in SAP S/4HANA! Connect quality management to materials management, production planning, ware......more
I 愛 AI is a book of essays, fiction, interviews and visual interventions that reintroduce sex, desire and politics into ......more
This book provides a comprehensive account of Croatian animation history, as well as an analysis of background factors s......more
This book presents insights into how Intelligent Computing and Optimization techniques can be used to attain the goals o......more
This book provides a comprehensive exploration of Industry 6.0, which marks the convergence of intelligent systems, mach......more
Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection ......more
Precision agriculture is a next-generation farming management concept that optimizes resource use, productivity, quality......more
This book presents an innovative method of EEG-based feature extraction and classification of seizures using EEG signals......more
How can the efficiency of the algorithms be increased with a lesser number of computations as well as optimized with the......more
This book summarizes the work developed over more than two decades in the field of advanced calibration techniques for v......more
This book primarily focuses on providing deep insight into the concepts of network security, network forensics, botnet f......more
This book provides an introduction to the most popular methods in machine learning. It covers regression including regul......more
This handbook of formal analysis in cryptography is very important for secure communication and processing of informatio......more
Handbook of Computer Programming with Python provides a hands-on experience based on the underlying topics, and assist s......more
Today AI and Machine/Deep Learning have become the hottest areas in the information technology. This book aims to provid......more
This book will throw light on recent developments in latest field and will be of great interest to know various applicat......more
This book provides unique multidisciplinary approach for exploring the potential contribution of AI and digital technolo......more
This book covers computational statistics-based approaches for Artificial Intelligence. The aim of this book is to provi......more
Computer vision and image analysis play an essential role in 4.0 IR as machine vision and image analysis are indispensab......more
Introduction to Machine Learning with Applications in Information Security, Second Edition provides a classroom-tested i......more
This book explores how to use generative adversarial networks in a variety of applications and emphasises their substant......more
This book highlights the importance of data-driven techniques to solve wireless communication problems. It presents a nu......more
This book explores the potential of 5G and beyond technologies in smart city setup, including introduction to 5G along w......more
This book is intended to help the incoming administration and members of critical infrastructure communities to prioriti......more
This volume provides the basis for contemporary privacy and social media research and informs global as well as local in......more
The global adoption of technology in education is transforming the way we teach and learn. Artificial Intelligence is on......more
Business Analytics, is driven by an increasing demand from the real world. This book reviews advances in data analytics ......more
This book is based on the work from world-famous experts on the application of DL for vehicle networks. It consists of t......more
The book follows a medical cyber-physical systems’ paradigm to handle the dimensionality conundrum stemming from image a......more
Python is an amazing programming language. It can be applied to almost any programming task. It allows for rapid develop......more
This book covers the topic of data science in a comprehensive manner and synthesizes both fundamental and advanced topic......more
This book gives readers a practical introduction to machine learning and sensing techniques, their design and ultimately......more
This text covers fundamentals of Python up to object-oriented concepts including regular expression, and applications in......more
Artificial Intelligence (AI) in general and machine learning (ML) and deep learning (DL) in particular and related digit......more
This book provides an accessible introduction to thermal physics with computational approaches that complement the tradi......more
Artificial intelligence and the use of computational methods to extract information from data are providing adequate too......more