You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The book explores the latest quantum computing research focusing on problems and challenges in the areas of data transmission technology, computer algorithms, artificial intelligence-based devices, computer technology, and their solutions. Future quantum machines will exponentially boost computing power, creating new opportunities for improving cybersecurity. Both classical and quantum-based cyberattacks can be proactively identified and stopped by quantum-based cybersecurity before they harm. Complex math-based problems that support several encryption standards could be quickly solved by using quantum machine learning. This comprehensive book examines how quantum machine learning and quantu...
Software testing has greatly evolved since the first edition of this book in 2011. Testers are now required to work in "agile" teams and focus on automating test cases. It has thus been necessary to update this work, in order to provide fundamental knowledge that testers should have to be effective and efficient in today's world. This book describes the fundamental aspects of testing in the different lifecycles, and how to implement and benefit from reviews and static analysis. Multiple other techniques are approached, such as equivalence partitioning, boundary value analysis, use case testing, decision tables and state transitions. This second edition also covers test management, test progress monitoring and incident management, in order to ensure that the testing information is correctly provided to the stakeholders. This book provides detailed course-study material for the 2023 version of the ISTQB Foundation level syllabus, including sample questions to help prepare for exams.
The use of discrete-event simulation in various fields, such as in industry, logistics and public health, has really taken off over the last few decades. The implementation of discrete-event simulation does however require an understanding, and perhaps even a mastery, of precise theoretical and methodological principles. Discrete-Event Simulation presents the key concepts involved in any discrete-event simulation project, covering the most frequently used techniques for analysing data and results, the methodological and practical aspects of implementing discrete-event simulation, along with an introduction to the use of the “Arena” discrete-event simulation tool. This book combines the elements presented with applied examples, as well as numerous examples of simulation projects in various fields.
Current categorizations of software requirements are highly ambiguous and inconsistent, mainly due to the lack of a clear, common framework for defining software elements and relevant environmental factors. This book overhauls the traditional approach by proposing an innovative systemic method for categorizing and modeling software requirements. It introduces an unprecedented frame of reference, putting an end to divergent interpretations by precisely defining software elements and environmental factors. This framework forms an indispensable basis for all the other components of this approach: a redefinition of requirements, a hybrid categorization that combines several taxonomies and scales, a metadata model used to qualify requirements, and a multi-view model that represents all possible categories of requirements. By adopting this new approach, professionals will be able to improve the clarity, precision and relevance of their specifications, and thus optimize the success of their software projects.
This new book brings together the most recent trends related to AI, machine learning, and network security. The chapters cover diverse topics on machine learning algorithms and security analytics, AI and machine learning, and ntework security applications. The volume presents a survey of speculative parallelism techniques, performance reviews, and efficient power consumption. The book also covers the concepts of IoT, security early detection for COVID-19, multimetric geoprahpical routing in VANETs, V2X communication in VANET, and optimization of congestion control scheme for VANETs. This book is a comprehensive take on recent applications and advancement in the field of computer science and will be of value to scientists, researchers, faculty, and students involved in research in the area of AI, machine learning, and network security.
This book talks of the Bengali Offbeat genre specially after the demise of Satyajit Ray. This book argues with ample data that on the contrary, the genre swelled further in the last 28 years with over 400 offbeat movies, made by younger generations charted new paths.
The focus for this set encompasses the region as a whole, as well as each individual country, comprising the Soviet legacy, cultural and social institutions, modern economic and political transition, and geopolitics and security.