21
Digital Twin Technologies in Transportation Infrastructure Management [E-Book] /
Table of Contents: ... Digital Twins in Design and Construction -- Chapter 6 Digital Twins in Operation and Maintenance(O&P) -- Chapter 7 Future of Digital Twins in Infrastructure Engineering and Management....

Full text 
22
Fault-Tolerant Cooperative Control of Unmanned Aerial Vehicles [E-Book] /
Yu, Ziquan
2024
Table of Contents: ... of Multi-UAVs With Multiple Leader UAVs -- Chapter 6. Distributed Finite-Time FTCC of Multi-UAVs With Multiple Leader UAVs -- Chapter 7. Decentralized Finite-Time Attitude FTCC of Multi-UAVs With Prescribed Performance -- Chapter 8. Decentralized Attitude FTCC...

Full text 
23
Modern Approaches in IoT and Machine Learning for Cyber Security [E-Book] : Latest Trends in AI /
24
CyberSecurity in a DevOps Environment [E-Book] : From Requirements to Monitoring /
Table of Contents: ... Systems -- 6. Interactive Application Security Testing with Hybrid Fuzzing and Statistical Estimators -- Part III: Protection at Operations -- 7. CTAM: a tool for Continuous Threat Analysis and Management -- 8. EARLY - a tool for real-time security attack...

Full text 
25
Programming-Based Formal Languages and Automata Theory [E-Book] : Design, Implement, Validate, and Prove /
Table of Contents: ...Part I: Fundamental Concepts -- 1. Introduction to FSM -- 2. Essential Background -- 3. Types of Proofs -- Part II: Regular Languages -- 4. Regular Expressions -- 5. Deterministic Finite-State Machines -- 6. Nondeterministic Finite State Machines -- 7...

Full text 
26
Edge Intelligent Computing Systems in Different Domains [E-Book] /
27
The Book of Chatbots [E-Book] : From ELIZA to ChatGPT /
Table of Contents: ... in eCommerce -- 7. Chatbots as Villains - The Antisocial Uses of AI -- 8. Towards an Artificial General Intelligence....

Full text 
28
Information Security Planning [E-Book] : A Practical Approach /
Table of Contents: .... Addressing Business Impact Analysis and Business Continuity -- Chapter. 6. Governing: Policy, Maturity Models and Planning -- Part. III. Tactical Security Planning -- Chapter. 7. Designing Information Security -- Chapter. 8. Planning for Network Security...

Full text 
29
Modeling Programming Competency [E-Book] : A Qualitative Analysis /
Table of Contents: ... -- References -- 7 Data Analysis of Guided Expert Interviews -- 7.1 Pre-processing of Data -- 7.1.1 Transcription Guidelines -- 7.1.2 Transcription System -- 7.1.3 Transcription Process -- 7.2 Data Analysis -- 7.3 Application of Quality Criteria References -- Part IV...

Full text 
30
Data Structures and Algorithms with Python [E-Book] : With an Introduction to Multiprocessing /
Table of Contents: ...1. Python Programming 101 -- 2. Computational Complexity -- 3. Recursion -- 4. Sequences -- 5. Sets and Maps -- 6. Trees -- 7. Graphs -- 8. Membership Structures -- 9. Heaps -- 10. Balanced Binary Search Trees -- 11. B-Trees -- 12. Heuristic Search....

Full text 
31
Digital Signal Processing [E-Book] : Illustration Using Python /
Table of Contents: ... Pole-Zero Placement Method-CHAPTER 7: FIR Filter Design-CHAPTER 8: Infinite Impulse Response Filter-CHAPTER 9: Effect of Quantization of Filter Coefficients-CHAPTER 10: Multi-rate Signal Processing-CHAPTER 11: Adaptive Signal Processing Case Studies....

Full text 
32
Structural Decision Diagrams in Digital Test [E-Book] : Theory and Applications /
Table of Contents: ... generation, fault diagnosis and testability -- Chapter 7: High-Level Decision Diagrams -- Chapter 8: Test generation for microprocessors with HLDDs....

Full text 
33
Introduction to Data Science [E-Book] : A Python Approach to Concepts, Techniques and Applications /
Table of Contents: ...1. Introduction to Data Science -- 2. Toolboxes for Data Scientists -- 3. Descriptive statistics -- 4. Statistical Inference -- 5. Supervised Learning -- 6. Regression Analysis -- 7. Unsupervised Learning -- 8. Network Analysis -- 9. Recommender Systems...

Full text 
34
Guide to Computer Network Security [E-Book] /
Table of Contents: ... in Computer Networks and Web Browsers -- 6. Security Assessment, Analysis, and Assurance -- 7. Disaster Management -- Access Control and Authorization -- 8. Authentication Control and Authorization -- 9. Authentication -- Cryptography -- 10. Firewalls -- 11. System...

Full text 
35
Introduction to Compiler Design [E-Book] /
36
Handbook of Evolutionary Machine Learning [E-Book] /
Table of Contents: .... Evolutionary Clustering -- Chapter 6. Evolutionary Classification and Regression -- Chapter 7. Evolutionary Ensemble Learning -- Chapter 8. Evolutionary Deep Learning -- Chapter 9. Evolutionary Generative Models -- Part 3. Evolutionary Computation for Machine...

Full text 
37
Advanced Computational Intelligence and Intelligent Informatics [E-Book] : 8th International Workshop, IWACIII 2023, Beijing, China, November 3-5, 2023, Proceedings, Part I.
38
Enterprise Design, Operations, and Computing. EDOC 2023 Workshops [E-Book] : IDAMS, iRESEARCH, MIDas4CS, SoEA4EE, EDOC Forum, Demonstrations Track and Doctoral Consortium, Groningen, The Netherlands, October 30-November 3, 2023, Revised Selected Papers /
39
6GN for Future Wireless Networks [E-Book] : 6th EAI International Conference, 6GN 2023, Shanghai, China, October 7-8, 2023, Proceedings, Part I /
40
6GN for Future Wireless Networks [E-Book] : 6th EAI International Conference, 6GN 2023, Shanghai, China, October 7-8, 2023, Proceedings, Part II /
Table of Contents: ...Image, Video, and Signal Processing -- Detection of Green Walnuts on Trees Using the Improved YOLOv7 Model -- Disease Recognition of Plants Leaves in Northern Shaanxi based on Siamese Networks -- Application of MED-TET to feature extraction of vibration...

Full text