The needs of future digital data and computer systems are expected to be two to three orders of magnitude larger than for ...
اقرأ المزيدThis project aims to develop a novel method for recognizing the shape of an object located behind thin medium utilizing combination ...
اقرأ المزيدThe ability to understand and control the unique properties of interfaces has created an entirely new field of magnetism, ...
اقرأ المزيدThe ability to understand and control the unique properties of interfaces has created an entirely new field of magnetism, ...
اقرأ المزيدThe ability to understand and control the unique properties of interfaces has created an entirely new field of magnetism ...
اقرأ المزيدThe ability to understand and control the unique properties of interfaces has created an entirely new field of magnetism ...
اقرأ المزيدThe Sun is our main source of UV radiation and its description occupies the first two chapters of the book. The Earth is ...
اقرأ المزيدIn the introduction accelerator-based light sources are considered and a comparison is made between free-electron lasers ...
اقرأ المزيدThis book deals with uncertainty forecasting based on a fuzzy time series approach, including fuzzy random processes and ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Sixth International Conference on Unconventional Computation, UC 2007,organized ...
اقرأ المزيدThe Fourth International Conference on Unconventional Computation, UC 2005, organized under the auspices of EATCS by the ...
اقرأ المزيدThis book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
اقرأ المزيدThe book is devoted to all aspects of unconventional computation ranging from theoretical and experimental aspects to various ...
اقرأ المزيدNowadays, developers have to face the proliferation of hardware and software environments, the increasing demands of the ...
اقرأ المزيدThis book offers a comprehensive summary of experiments that are especially suited to reveal the order-parameter symmetry ...
اقرأ المزيدProvides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
اقرأ المزيدDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
اقرأ المزيدA practical, no-nonsense guide to digital marketing, giving readers all the information they need to feel confident engaging ...
اقرأ المزيدGain essential grounding in SEO, email marketing, social media, content marketing, performance marketing and much more, with ...
اقرأ المزيدThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
اقرأ المزيد