Sökt på: Sökresultat
totalt 50 träffar
Cuba, My (twice) Betrayed Generation: Half a century later, Memoirs of those who fought for freedom
After-sales Service of Engineering Industrial Assets
This book explores the practical implementation of an advanced after-sales management framework devoted to warranty management. The framework is intended for companies producing …
Computer Vision and Machine Intelligence for Renewable Energy Systems
Computer Vision and Machine Intelligence in Renewable Energy Systems, the first release in Elsevier's cutting-edge new series, Advances in Intelligent Energy Systems, offers a …
Intelligent Systems and Machine Learning
This two-volume set constitutes the refereed proceedings of the First EAI International Conference on Intelligent Systems and Machine Learning, ICISML 2022, held in Hyderabad, …
Smart IoT for Research and Industry
This book covers a variety of smart IoT applications for industry and research. For industry, the book is a guide for considering the real-time aspects of automation of application …
Handbook of Research on Industrial Advancement in Scientific Knowledge
In a society that praises and promotes technological advancement, it becomes increasingly essential to review the effects of such rapid technological growth. New high-tech advances …
International criminal law
This research aims to evaluate the influence of the criminalization of the crimes and abuses committed by the courts in the Nuremberg trials of the surviving leaders of the Nazi …
Demystifying Graph Data Science
With the growing maturity and stability of digitization and edge technologies, vast numbers of digital entities, connected devices, and microservices interact purposefully to …
Handbook of IoT and Big Data
This multi-contributed handbook focuses on the latest workings of IoT (internet of Things) and Big Data. As the resources are limited, it's the endeavor of the authors to support …
Handbook of IoT and Big Data
This multi-contributed handbook focuses on the latest workings of IoT (internet of Things) and Big Data. As the resources are limited, it's the endeavor of the authors to support …
Confidential Computing
This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or …