- Sách/Book
Authors: Romanovsky, Alexander (2001) - This book is composed of five parts, which deal with topics related to exception handling in the context of programming language models, design methodologies, concurrent and distributed systems, applications and experiences, and large-scale systems such as database and workflow process mangagement systems. The 17 coherently written chapters by leading researchers competently address a wide range of issues in exception handling.
|
- Sách/Book
Authors: McFedries, Paul (2023) - This step-by-step guide is packed with exercises that walk you through the basic and advanced functions and formulas included in Excel. At your own speed, you'll learn how to enter data, format your spreadsheet, and apply the mathematical and statistical capabilities of the program.
|
- Sách/Book
Authors: Thakkar, Hiren Kumar (2023) - The book also explores power of predictive analytics of Blockchain, IoT, and 5G data in cloud computing with its sister technologies. Since, the amount of resources increases day-by day, artificial intelligence (AI) tools are becoming more popular due to their capability which can be used in solving wide variety of issues, such as minimize the energy consumption of physical servers, optimize the service cost, improve the quality of experience, increase the service availability, efficiently handle the huge data flow, manages the large number of IoT devices, etc.
|
- Sách/Book
Authors: Barthelmeß, Ulrike (2023) - Topics such as logical reasoning, knowledge and memory play just as important a role as machine learning and artificial neural networks. In the foreground is the question of what constitutes memory and thinking, what role our emotions play when we as humans move through life, through the world. A book that offers unusual perspectives on artificial intelligence.
|
- Sách/Book
Authors: Sharma, Anand (2023) - This book features new and innovative research on the positive contributions of IoT and cloud technology healthcare information systems for the improvement of patient care and disease management. Highlighting the challenges and difficulties in implementing IoT and cloud technology in the healthcare field, the volume focuses on theories, systems, methods, algorithms, and applications
|
- Sách/Book
Authors: Gremban, Keith (2023) - IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses challenges in converting defense industrial operations to IoT and summarizes policy recommendations for regulating government use of IoT in free societies.
|
- Sách/Book
Authors: Cao, Jie (2023) - This book seeks to give readers with a preliminary but critical introduction and summary of e-commerce and big data analysis. This book introduces how to achieve data acquisition and pre-processing.
|
- Sách/Book
Authors: Lee, Chung-Yee (2015) - This book focuses on the impact of ocean transport logistics on global supply chains. It is the first book solely dedicated to the topic, linking the interaction of parties along this chain, including shippers, terminal operators and line carriers. While ocean container transport logistics has been greatly studied, there are many important issues that have yet to receive the attention they deserve. The editors and contributing authors of Ocean Container Transport Logistics: Making Global Supply Chains Effective now seek to address these topics and shed new light on the subject
|
- Sách/Book
Authors: Rogers, Yvonne (2023) - In the newly updated sixth edition of Interaction Design: Beyond Human-Computer Interaction, a team of accomplished technology, design, and computing professors delivers an intuitive and instructive discussion of the principles underlying the design of effective interactive technologies. The authors discuss how to design and apply digital technologies in the real world, illustrated with numerous examples. The book explores the interdisciplinary foundations of interaction design, including skills from product design, computer science, human and social psychology, and others.
|
- Sách/Book
Authors: Easttom, William (2023) - This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.
|