Electronic Books

Total Books: 101 - 120 /205
NoIMG
FitBuddy: an artificial intelligence powered personal trainer / Mohammed Abdulrahman Al Khatib , Mouaz Anwar Anan , Riham Nizar Hannoun , Tala Raffat Babili and Tima Wassim Hadaya ; Supervised by Nada Ghneim , Massa Baali and Mohammad Al Masre محمد عبد الرحمن الخطيب ، معاذ أنور عنان ، رهام نزار حنون ، تالا رأفت ببيلي و تيماء وسيم هدايا ؛ إشراف ندى غنيم ، ماسة البعلي و محمد المصري

FitBuddy App is a sports application that employs artificial intelligence in its job as a personal trainer that enables users ...

Lire la suite
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

Lire la suite
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

Lire la suite
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

Lire la suite
Forensic Ethics and the Expert Witness

The expert witness’ job is often described as a balancing act: duty to clients on the one hand, duty to society on the ...

Lire la suite
From Program to Product : Turning Your Code into A Saleable Product

Many would–be software entrepreneurs with expertise in many fields attempt to turn a homegrown application—one developed ...

Lire la suite
From Specification to Embedded Systems Application

Application documents recent approaches and results presented at the International Embedded Systems Symposium (IESS 2005), ...

Lire la suite
General Theory of Information Transfer and Combinatorics

This book constitutes the thoroughly refereed research papers contributed to a research project on the `General Theory of ...

Lire la suite
Generative Programming and Component Engineering

Generative Programming and Component Engineering (GPCE) is a leading - searchconferenceonautomaticprogrammingandcomponentengineering.These ...

Lire la suite
Giving Death a Helping Hand : Physician-Assisted Suicide and Public Policy. An International Perspective

The volume focuses on public policy issues related to physician-assisted suicide. It offers a detailed analysis of the current ...

Lire la suite
Hands-on Question Answering Systems with BERT : Applications in Neural Networks and Natural Language Processing / Navin Sabharwal

Begins with an overview of the technology landscape behind BERT. It takes you through the basics of NLP, including natural ...

Lire la suite
NoIMG
Hearing faces / Banan Barakat , Esraa Marzouka , Ghalia Al Sabbagh , Leen Al Hendi and Zeina Mustafa ; Supervised by Nada Ghniem and Khloud Al Jallad بنان عبد الله بركات ، اسراء مرزوقة ، غالية الصباغ ، لين حسان الهندي و زينة عصام مصطفى ؛ إشراف ندى غنيم و خلود الجلاد

Our project aims to aid deaf-mute people by tracking hand movements of the deaf-mute person for word level American Sign ...

Lire la suite
How to Engineer Software: A Model-Based Approach / Steve Tockey

The book promotes development scalability through domain partitioning and subdomain partitioning. It also explores software ...

Lire la suite
Information Hiding

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...

Lire la suite
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

Lire la suite
Information Hiding

All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...

Lire la suite
Information Security (vol. # 4176)

th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...

Lire la suite
Information Security Applications

Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...

Lire la suite
Information Security Practice and Experience : 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings

The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...

Lire la suite
Information Security and Cryptology (vol. # 3822)

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...

Lire la suite
Total Books: 101 - 120 /205