Home | Amazing | Today | Tags | Publishers | Years | Search 
Emotion Recognition and Understanding for Emotional Human-Robot Interaction Systems (Studies in Computational Intelligence, 926)
Emotion Recognition and Understanding for Emotional Human-Robot Interaction Systems (Studies in Computational Intelligence, 926)
This book focuses on the key technologies and scientific problems involved in emotional robot systems, such as multimodal emotion recognition (i.e., facial expression/speech/gesture and their multimodal emotion recognition) and emotion intention understanding, and presents the design and application examples of emotional HRI systems. Aiming at...
Developments in Information & Knowledge Management for Business Applications: Volume 1 (Studies in Systems, Decision and Control, 330)
Developments in Information & Knowledge Management for Business Applications: Volume 1 (Studies in Systems, Decision and Control, 330)

This book provides solutions to manage information competently in order to increase its business usage. The information/knowledge business is a highly-dynamic evolving industry, and the novel methodologies and practices for the business information processing, as well as application of mathematical models to the business analytics...

Next Generation Sequencing and Data Analysis (Learning Materials in Biosciences)
Next Generation Sequencing and Data Analysis (Learning Materials in Biosciences)

This textbook provides step-by-step protocols and detailed explanations for RNA Sequencing, ChIP-Sequencing and Epigenetic Sequencing applications.

The reader learns how to perform Next Generation Sequencing data analysis, how to interpret and visualize the data, and acquires knowledge on the statistical background of...

CO2 Injection in the Network of Carbonate Fractures (Petroleum Engineering)
CO2 Injection in the Network of Carbonate Fractures (Petroleum Engineering)

This book presents guidelines for the design, operation and monitoring of CO2 injection in fractured carbonates, with low permeability in the rock matrix, for geological storage in permanent trapping. 

CO2 migration is dominated by fractures in formations where the hydrodynamic and geochemical effects induced by the...

Energy and Environmental Security in Developing Countries (Advanced Sciences and Technologies for Security Applications)
Energy and Environmental Security in Developing Countries (Advanced Sciences and Technologies for Security Applications)

This book presents a comprehensive account of the energy and environmental security perspectives of the developing countries. To address the subject comprehensively, it covers four geographically diverse clusters of developing countries from across the world. The regions particularly focused on are: South Asia, South East Asia, Sub...

Faces of Geometry: II Edition (Lecture Notes in Networks and Systems, 172)
Faces of Geometry: II Edition (Lecture Notes in Networks and Systems, 172)
The volume reports on interdisciplinary discussions and interactions between theoretical research and practical studies on geometric structures and their applications in architecture, the arts, design, education, engineering, and mathematics. These related fields of research can enrich each other and renew their mutual interest in these topics...
Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
This book focuses on the application of ionic liquids in flow assurance in the oil and gas industry. It discusses their physiochemical properties, and considers the role of ionic liquids as gas hydrate inhibitors in offshore pipelines.

Gas hydrate occurrence can pose a major threat to pipeline integrity. Therefore, different...

Empiricism and Philosophy of Physics (Synthese Library, 434)
Empiricism and Philosophy of Physics (Synthese Library, 434)

This book presents a thoroughly empiricist account of physics. By providing an overview of the development of empiricism from Ockham to van Fraassen the book lays the foundation for its own version of empiricism. Empiricism for the author consists of three ideas: nominalism, i.e. dismissing second order quantification as unnecessary,...

The New Common: How the COVID-19 Pandemic is Transforming Society
The New Common: How the COVID-19 Pandemic is Transforming Society

This open access book presents the scientific views of some fifty experts on how they believe the COVID-19 pandemic is currently affecting society, and how it will continue to do so in the years to come. Using the concept of a “common” (in the sense of common values, common places, common goods, and common sense), they...

Intelligent System Solutions for Auto Mobility and Beyond: Advanced Microsystems for Automotive Applications 2020 (Lecture Notes in Mobility)
Intelligent System Solutions for Auto Mobility and Beyond: Advanced Microsystems for Automotive Applications 2020 (Lecture Notes in Mobility)

This book gathers papers from the 23rd International Forum on Advanced Microsystems for Automotive Applications (AMAA 2020) held online from Berlin, Germany, on May 26-27, 2020. Focusing on intelligent system solutions for auto mobility and beyond, it discusses in detail innovations and technologies enabling electrification,...

Mining Intelligence and Knowledge Exploration: 7th International Conference, MIKE 2019, Goa, India, December 19–22, 2019, Proceedings (Lecture Notes in Computer Science, 11987)
Mining Intelligence and Knowledge Exploration: 7th International Conference, MIKE 2019, Goa, India, December 19–22, 2019, Proceedings (Lecture Notes in Computer Science, 11987)

This book constitutes the refereed conference proceedings of the 7th International Conference on Mining Intelligence and Knowledge Exploration, MIKE 2019, held in Goa, India, in December 2019.

The 31 full papers were carefully reviewed and selected from 83 submissions. The accepted papers were chosen on the basis of...

Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

Result Page: Previous 3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107 3108 3109 3110 3111 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy