You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
It is the 12th issue of the international scientific journal "European Scientific e-Journal" (Czech Republic). There are 5 works in the fields of management and administrative jurisprudence in Bulgaria and Russia. The works are written in English and Bulgarian languages.
This book gathers the peer-reviewed proceedings of the 14th Annual Meeting of the Bulgarian Section of the Society for Industrial and Applied Mathematics, BGSIAM'19, held in Sofia, Bulgaria. The general theme of BGSIAM'19 was industrial and applied mathematics with particular focus on mathematical physics, numerical analysis, high-performance computing, optimization and control, mathematical biology, stochastic modeling, machine learning, digitization and imaging, and advanced computing in environmental, biomedical, and engineering applications.
This book describes new methods for building intelligent systems using type-2 fuzzy logic and soft computing (SC) techniques. The authors extend the use of fuzzy logic to a higher order, which is called type-2 fuzzy logic. Combining type-2 fuzzy logic with traditional SC techniques, we can build powerful hybrid intelligent systems that can use the advantages that each technique offers. This book is intended to be a major reference tool and can be used as a textbook.
This book presents the very concept of an index matrix and its related augmented matrix calculus in a comprehensive form. It mostly illustrates the exposition with examples related to the generalized nets and intuitionistic fuzzy sets which are examples of an extremely wide array of possible application areas. The present book contains the basic results of the author over index matrices and some of its open problems with the aim to stimulating more researchers to start working in this area.
This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.