Card List Article
This book covers topics from numerical and symbolic computing, including the main numerical and symbolic methods, schemes and applications. Section 1 ..
This book covers topics from numerical and symbolic computing, including the main numerical and symbolic methods, schemes and applications. Section 1 ..
This book covers different topics from information theory methods and approaches, block and stream coding, lossless data compression, and information ..
In this book - we present topics from: formal grammars in programming, programming languages semantics, finite automata, and formal methods and semant..
The book "Concurrent, Parallel, and Distributed Computing" offers an excellent overview of the various areas of the computing field. There is a lot of..
Image and Sound Processing for Social Media is an essential guide for anyone looking to understand the basics of picture and sound processing. This bo..
Data structure and algorithms are two of the most important aspects of computer science. Data structure and algorithms help in understanding the natur..
This book covers different topics from intelligent control and automation, including intelligent control methods, fuzzy control techniques, neural net..
This book covers different topics from data analysis and information processing, including data analytics methods, big data methods, data mining metho..
Now a Days, cyber security is widely viewed as a matter of pressing national importance. Many elements of cyberspace are notoriously vulnerable to an ..
This book covers some introductory steps in using R programming language as a data science tool. The data science field has evolved so much recently w..
In this 21st century era, people tend to find another space for improving everything, including technology. This includes the possibility of reaching ..
This era of information technology has a distinctive features of enormous amount of data being produced and stored by all forms human activities. Comp..
This comprehensive guide provides a detailed overview of modern biometrics, which allows a person to be identified and authenticated based on recogniz..
Along with providing an overview of cloud computing, this book talks about the various other dimensions involved in it such as the risk issues and sec..
A basic introduction into the network coding , the theoretical frameowork for network coding, its implementation in the wireless systems are the diffe..