Written specifically for information systems (IS) and computing students, this book has everything you need to know about how to execute a research project. It will help you undertake a project by guiding you through the research life cycle, from choosing a research topic to investigating it using appropriate methods, to presenting the findings and …
Computational inference has taken its place alongside asymptotic inference and exact techniques in the standard collection of statistical methods. Computational inference is based on an approach to statistical methods that uses modern computational power to simulate distributional properties of estimators and test statistics. This book describes com…
Mobile Computing Handbook explores the benefit and challenges of the field, and includes the latest insight into the major topics of this emerging discipline. It provides, in 40 chapters written by industry experts, technical information about all aspects of mobile computing, from basic concepts to research-level material, with learned analysis of f…
Mobile computing technology addresses challenges that enable the realization of a global village concept where people can seamlessly access any information anywhere anytime through any device. Written by professionals who have worked on several technologies, the book covers all communication technologies starting from First Generation to Beyond Thir…
This multidisciplinary volume originates from lectures presented at a short course on wireless communications in Capri, Italy. This globally attended event has produced an exceptional book written by pioneers in the field. Lecturers at Capri included pillars in the fields of electromag- netics, communications, information technology and mathematics.…
The course of Artificial Intelligence is taken by all engineering undergraduate and postgraduate students pursuing computer science. Apart from this, it is a popular elective in almost all other branches of engineering. It is also a field chosen for research by many doctoral students. This book has in-depth detail illustration of all the chapters of…
The second edition of this book provides a comprehensive introduction to a consortium of technologies underlying soft computing, an evolving branch of computational intelligence, which in recent years, has turned synonymous to it. The constituent technologies discussed comprise neural network (NN), fuzzy system (FS), evolutionary algorithm (EA), and…
With double-digit growth predicted in industry, today's students need to learn cloud computing to successfully enter the workforce. Distributed and Cloud Computing brings the principles of cloud computing to distributed systems courses. Start-ing with an overview of modern distributed models, the book exposes the design principles, systems architect…
You will learn about Azure Active Directory (AAD) and the utilization of AAD in application and infrastructure security. Essential aspects of maintaining secure application keys and certificates are further explained in the context of Azure Key Vault. New application security implementations such as Azure configurations and Azure Defender for Azure …