-
Database Systems for Advanced Applications
This book constitutes the workshop proceedings of the 23rd International Conference on Database Systems for Advanced Applications, DASFAA 2018, held in Gold Coast, QLD, Australia, in May 2018.
₹5,422.00 -
Computer Vision Metrics
Based on the successful 2014 book published by Apress, this textbook edition is expanded to provide a comprehensive history and state-of-the-art survey for fundamental computer vision methods and deep learning. With over 800 essential references, as well as chapter-by-chapter learning assignments, both students and researchers can dig deeper into core computer vision topics and deep learning architectures. The survey covers everything from feature descriptors, regional and global feature metrics, feature learning architectures, deep learning, neuroscience of vision, neural networks, and detailed example architectures to illustrate computer vision hardware and software optimization methods.
₹10,284.00 -
Computer Organization and Design ARM Edition: The Hardware Software Interface
The new ARM Edition of Computer Organization and Design features a subset of the ARMv8-A architecture, which is used to present the fundamentals of hardware technologies, assembly language, computer arithmetic, pipelining, memory hierarchies, and I/O.
₹8,250.00 -
Usability Testing Essentials: Ready, Set…Test!
The book begins by presenting the essentials of usability testing, which include focusing on the user and not the product; knowing when to conduct small or large studies; and thinking of usability as hill climbing. It then reviews testing options and places usability testing into the context of a user-centered design (UCD). It goes on to discuss the planning, preparation, and implementation of a usability test.
₹4,350.00 -
Classical and Recent Aspects of Power System Optimization
Classical and Recent Aspects of Power System Optimization presents conventional and meta-heuristic optimization methods and algorithms for power system studies. The classic aspects of optimization in power systems, such as optimal power flow, economic dispatch, unit commitment and power quality optimization are covered, as are issues relating to distributed generation sizing, allocation problems, scheduling of renewable resources, energy storage, power reserve based problems, efficient use of smart grid capabilities, and protection studies in modern power systems.
₹12,945.00 -
Certifiable Software Applications 3
Certifiable Software Applications 3: Downward Cycle describes the descending phase of the creation of a software application, detailing specification phases, architecture, design and coding, and important concepts on modeling and implementation.
₹15,103.00 -
Deep Learning through Sparse and Low-Rank Modeling
Deep Learning through Sparse Representation and Low-Rank Modeling bridges classical sparse and low rank models―those that emphasize problem-specific Interpretability―with recent deep network models that have enabled a larger learning capacity and better utilization of Big Data.
₹8,626.00 -
Hiding Behind the Keyboard
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them.
₹5,174.00 -
New Telecom Networks: Enterprises and Security
Nowadays, the Internet has become an irreplaceable tool, feeding us information about new innovations and the evolution of the markets relating to all human activities. What the Internet lacks, though, is a guiding narrative thread, which is crucial to understand the evolution from old technologies into the technologies available today, and to benefit from the commentary which could elucidate that process of evolution. In spite of its inherent richness, no encyclopedia can constitute the one and only referential information source.
₹17,150.00 -
High speed & large scale scientific computing
During the last decade parallel technologies have completely transformed main stream computing. The majority of standard PC ́s today incorporate multi-processor chips, with up to four processors. This number will reach eight and more processors soon. The flexibility that parallel systems constructed with commodity components offer, make them easy to link through wide area networks, such as the Internet, to realize Grids or Clouds.
₹5,950.00 -
Internet Searches for Vetting, Investigations, and Open-Source Intelligence
In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security.
₹5,950.00 -
Ontologies and Semantic Technologies for Intelligence
Featuring chapters by selected contributors to the second international Ontology for the Intelligence Community (OIC) conference, this book offers a partial technology roadmap for decision makers in the field of information integration, sharing and situational awareness in the use of ontologies and semantic technologies for intelligence. It focuses on intelligence community needs and the application of ontologies and semantic technologies to assist those needs.
₹10,199.00 -
Official (ISC)2 Guide to the CISSP CBK
With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company’s reputation, violating a consumer’s privacy, compromising intellectual property, and in some cases endangering personal safety. This is why it is essential for information security professionals to stay up to date with the latest advances in technology and the new security threats they create.
₹5,599.00 -
Casino Security and Gaming Surveillance
Almost all incidences of cheating, theft, fraud, or loss can be detected through the surveillance of critical transactions, audit observations, and reviews of key metrics. Providing proven-techniques for detecting and mitigating the ever-evolving threats to casino security, this book covers the core skills, knowledge, and techniques needed to protect casino assets, guests, and employees.
₹13,999.00 -
System Fault Diagnostics, Reliability and Related Knowledge-Based Approaches
Format Hardcover Subject Engineering General Miscellaneous Mathematics Mathematics Engineering General Miscellaneous Publisher Springer
₹14,024.00 -
Web Engineering: The Discipline of Systematic Development of Web Applications
The World Wide Web has a massive and permanent influence on our lives. Economy, industry, education, healthcare, public administration, entertainment – there is hardly any part of our daily lives which has not been pervaded by the Internet.
₹6,050.00 -
Received Signal Strength Based Target Localization and Tracking Using Wireless Sensor Networks
This book briefly summarizes the current state of the art technologies and solutions for location and tracking (L&T) in wireless sensor networks (WSN), focusing on RSS-based schemes. The authors offer broad and in-depth coverage of essential topics including range-based and range-free localization strategies, and signal path loss models. In addition, the book includes motion models and how state estimation techniques and advanced machine learning techniques can be utilized to design L&T systems for a given problem using low cost measurement metric (that is RSS).
₹12,154.00 -
Blockchain Technology: Applications and Challenges
This book discusses the various open issues of blockchain technology, such as the efficiency of blockchain in different domains of digital cryptocurrency, smart contracts, smart education system, smart cities, cloud identity and access, safeguard to cybersecurity and health care. For the first time in human history, people across the world can trust each other and transact over a large peer-to-peer networks without any central authority.
₹15,799.00 -
Convergence of Internet of Things and Blockchain Technologies
This book presents chapters from diverse range of authors on different aspects of how Blockchain and IoT are converging and the impacts of these developments. The book provides an extensive cross-sectional and multi-disciplinary look into this trend and how it affects artificial intelligence, cyber-physical systems, and robotics with a look at applications in aerospace, agriculture, automotive, critical infrastructures, healthcare, manufacturing, retail, smart transport systems, smart cities, and smart healthcare.
₹13,950.00 -
Security and Privacy Preserving for IoT and 5G Networks
This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications
₹14,024.00