Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin act...More info...
Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin activ...More info...
This proceedings volume contains selected chapters on topics related to artificial intelligence, cybersecurity and game design and their sustainable applications, emphasizing sustainable applications that directly address topics related to five SDGs...More info...
Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and comp...More info...
This book provides a comprehensive guide to the groundbreaking technologies underpinning the Smart and Connected Health (SCH) revolution. It aims to demystify the principles, architectures, applications, challenges, and potentials of AI, Tiny ML,...More info...
Frugal Innovation: The Systematic Design of Resource-Intelligent Solutions advocates for a systematic approach to developing impactful, resource-efficient solutions in low-resource and high-resource settings. It integrates frugal innovation...More info...
Frugal Innovation: The Systematic Design of Resource-Intelligent Solutions advocates for a systematic approach to developing impactful, resource-efficient solutions in low-resource and high-resource settings. It integrates frugal innovation...More info...
This book presents the latest international research achievements in complex chaotic systems, establishing itself as an reference with high value in nonlinear dynamics and chaos theory. The book systematically explores dynamical behaviors of complex...More info...
Integrating the adaptive learning control, backstepping technology, and event-triggered mechanism, this book solve the problems of the strong nonlinearity, complex constraints and uncertainties that traditional methods cannot handle. This book break...More info...
Offers methods for data analysis and interdisciplinary research, including statistical methods, CUSUM control charts, Poisson models, Bayesian approach, software programs, ML algorithms, big data, and more for addressing complex challenges in areas...More info...
The Routledge International Handbook of Research Security examines research security the act of protecting and securing university research and teaching in the name of national security through a multi-disciplinary and comparative lens....More info...
Purposefully situated beyond popular deconstructionist theory and anthropocentric perspectives, this 10th Anniversary Edition of Decolonizing Educational Research examines the ways through which coloniality manifests in contexts of knowledge and mea...More info...
Purposefully situated beyond popular deconstructionist theory and anthropocentric perspectives, this 10th Anniversary Edition of Decolonizing Educational Research examines the ways through which coloniality manifests in contexts of knowledge and mea...More info...
This seminal volume delivers a comprehensive introduction to the emerging field of digital minds, exploring the moral implications of AI systems that can potentially think, feel and experience the world around them in ways that are likely to be ve...More info...
This seminal volume delivers a comprehensive introduction to the emerging field of digital minds, exploring the moral implications of AI systems that can potentially think, feel and experience the world around them in ways that are likely to be ve...More info...
This book breaks the trading journey into three clear stages: Preparation, Process, and Practice. Through this structure, the book helps readers develop a professional mindset, master a disciplined approach to identifying, executing, managing, and e...More info...
This proceedings volume is a collection of 35 chapters presented at the Second International Conference on Artificial Intelligence, Machine Learning and Intelligent Systems (ICAMS-2025), held at the National Institute of Technology Hamirpur, Himac...More info...
Statistics With Humans demystifies statistics for the social and behavioral sciences. Author Katie Jacobs combines relatable examples, a conversational approach, and vibrant visuals to win over even math-averse students. Gui...More info...
Writing Mixed Methods Research for Publication is a practical guide designed to help instructors teach students how to successfully publish mixed methods research. Recognizing the complexity of integrating qualitative and quantitativ...More info...
This volume brings together selected contributions from the conference Functor and Tensor Categories, Models and Systems (Santiago de Compostela, Spain, June 2024), along with several invited contribution...More info...
Graph packing problem is one of the central problems in graph theory and combinatorial optimization. The famous Steiner tree packing problem in undirected graphs has become an well-established area. It is natural to extend this problem to digraphs....More info...
This book collects research presented at the Sixth Meeting for Dissemination and Research in the Study of Complex Systems and their Applications (EDIESCA 2025). EDIESCA arises from the need to foster academic and research groups that can carry out s...More info...
This open access book is a practical guide to experimentally understand, analyze, and optimize the performance of 5G networks. It is organized as a series of simulation projects supplemented with the underlying theory, to help readers learn various...More info...
This textbook provides an exciting new addition to the area of network science featuring a stronger and more methodical link of models to their mathematical origin and explains how these relate to each other with special focus on epidemic spread on...More info...
This book presents Documents of Life (DoLs) as a research framework, offering both scholarly insight and practical guidance for conducting this kind of work. The book will interest students seeking guidance on conducting autoethnographic research, a...More info...
This book presents Documents of Life (DoLs) as a research framework, offering both scholarly insight and practical guidance for conducting this kind of work. The book will interest students seeking guidance on conducting autoethnographic research, a...More info...
This book highlights that Mass and Proper Time, which are well-defined classically, have all sorts of conceptual problems when considered quantum- mechanically. When systems interact, the masses change to include binding energies, etc., but are no...More info...
Natural disasters such as earthquakes, floods, landslides, and extreme weather events pose serious threats to industrial operations, leading to disruptions, infrastructure damage, and financial losses. With increasing climate variability, industries...More info...
Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin act...More info...
Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin activ...More info...
This proceedings volume contains selected chapters on topics related to artificial intelligence, cybersecurity and game design and their sustainable applications, emphasizing sustainable applications that directly address topics related to five SDGs...More info...
Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and comp...More info...
Offers methods for data analysis and interdisciplinary research, including statistical methods, CUSUM control charts, Poisson models, Bayesian approach, software programs, ML algorithms, big data, and more for addressing complex challenges in areas...More info...
Integrating the adaptive learning control, backstepping technology, and event-triggered mechanism, this book solve the problems of the strong nonlinearity, complex constraints and uncertainties that traditional methods cannot handle. This book break...More info...
This book presents the latest international research achievements in complex chaotic systems, establishing itself as an reference with high value in nonlinear dynamics and chaos theory. The book systematically explores dynamical behaviors of complex...More info...
Readers of all backgrounds will learn about cryptographys role in protecting everyday digital interactions – from buying a coffee to texting a friend – from two security experts.This cybersecurity book for beginners and experts alike...More info...
This volume investigates the ways in which Q methodology contributes to language education and language policy research, demonstrating how this research approach can be used to explore topics including identity, motivation, cognition, emotion, pre-s...More info...
Frugal Innovation: The Systematic Design of Resource-Intelligent Solutions advocates for a systematic approach to developing impactful, resource-efficient solutions in low-resource and high-resource settings. It integrates frugal innovation...More info...
Frugal Innovation: The Systematic Design of Resource-Intelligent Solutions advocates for a systematic approach to developing impactful, resource-efficient solutions in low-resource and high-resource settings. It integrates frugal innovation...More info...
This book provides a comprehensive guide to the groundbreaking technologies underpinning the Smart and Connected Health (SCH) revolution. It aims to demystify the principles, architectures, applications, challenges, and potentials of AI, Tiny ML,...More info...
This seminal volume delivers a comprehensive introduction to the emerging field of digital minds, exploring the moral implications of AI systems that can potentially think, feel and experience the world around them in ways that are likely to be ve...More info...
Purposefully situated beyond popular deconstructionist theory and anthropocentric perspectives, this 10th Anniversary Edition of Decolonizing Educational Research examines the ways through which coloniality manifests in contexts of knowledge and mea...More info...
Purposefully situated beyond popular deconstructionist theory and anthropocentric perspectives, this 10th Anniversary Edition of Decolonizing Educational Research examines the ways through which coloniality manifests in contexts of knowledge and mea...More info...
Bias and Beyond is anchored in a commitment to Diversity, Equity, and Inclusion (DEI), not only as aspirational values but as methodological imperatives that must inform every aspect of data practice....More info...
Bias and Beyond is anchored in a commitment to Diversity, Equity, and Inclusion (DEI), not only as aspirational values but as methodological imperatives that must inform every aspect of data practice....More info...
This seminal volume delivers a comprehensive introduction to the emerging field of digital minds, exploring the moral implications of AI systems that can potentially think, feel and experience the world around them in ways that are likely to be ve...More info...