Repository logo
  • Log In
  • ...
  • Log In
  • ...
Repository logo
LIBRARY CENTER DIGITAL LIBRARY
  • Communities & Collections
  • Browse
    • By Issue Date
    • By Author
    • By Title
    • By Subject
    • By Type
    • By Topic
  • Entities
  • Help
  • Contact
  1. Home
  2. Browse by Topic

Browse

  • Communities & Collections
  • Issue Date
  • Author
  • Title
  • Subject
  • Type
  • Topic

Author profile

  • Đặng, Hương Giang (13)
  • Trần, Thị Hoàng Yến (6)
  • Đinh, Thị Kim Xuyến (5)
  • Hoàng, Thu Hiền (5)
  • Nguyễn, Văn Mùi (4)
  • Nguyễn, Thành Huân (4)
  • Vũ, Thị Thục Oanh (3)
  • Nguyễn, Thị Thu Hằng (3)
  • Phạm, Thị Thùy Vân (2)
  • Đặng, Thị Tuyết Minh (2)
  • Vũ, Thị Anh (2)
  • Trần, Hoàng Long (2)
  • Ngô, Thế Chi (2)
  • Ngô, Thị Trà (1)
  • Đặng, Thu Trang (1)
  • Vũ, Thành Long (1)
  • Vũ, Mỹ Hạnh (1)
  • Phan, Thị Thanh Hương (1)
  • Nguyễn, Trường Giang (1)
  • Nguyễn, Thị Tình (1)
  • Đặng, Văn Hòa (1)
  • Trần, Thanh Đại (1)
  • Mai, Thị Vân Anh (1)
  • Nguyễn, Thị Thanh Hoa (1)
  • Nguyễn, Hồng Yến (1)
  • Phạm, Thị Thu (1)
  • Đỗ, Thị Kim Loan (1)
  • Đặng, Thị Hương Giang (1)
  • Nguyễn, Thị Chà (1)
  • Nguyễn, Ngọc Khương (0)

Load More

TRAINING MAJORS

  • Khoa Điện - Tự động hóa (791)
  • Khoa Công nghệ thông tin (477)
  • Khoa Cơ khí (364)
  • Khoa Dệt may và Thời Trang (157)
  • Khoa Công nghệ thực phẩm (104)

Load More

  1. Home
  2. Browse by Topic

Browsing by Topic "Khoa Điện tử và Kỹ thuật máy tính"

Jump to
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Enter the first letter
Now showing 1 - 24 of 333
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Publication
    AI and Blockchain Technology in 6G Wireless Network
    (Springer, 2022) Borah, Malaya Dutta; Singh, Pushpa; Deka, Ganesh Chandra
    This book highlights future research directions and latent solutions by integrating AI and Blockchain 6G networks, comprising computation efficiency, algorithms robustness, hardware development and energy management. This book brings together leading researchers in Academia and industry from diverse backgrounds to deliver to the technical community an outline of emerging technologies, advanced architectures, challenges, open issues and future directions of 6G networks. This book is written for researchers, professionals and students to learn about the integration of technologies such as AI and Blockchain into 6G network and communications. This book addresses the topics such as consensus protocol, architecture, intelligent dynamic resource management, security and privacy in 6G to integrate AI and Blockchain and new real-time application with further research opportunities.
  • Loading...
    Thumbnail Image
    Publication
    Algorithms For Big Data
    (World Scientific, 2020) Feldman, Moran
    This unique volume is an introduction for computer scientists, including a formal study of theoretical algorithms for Big Data applications, which allows them to work on such algorithms in the future. It also serves as a useful reference guide for the general computer science population, providing a comprehensive overview of the fascinating world of such algorithms.To achieve these goals, the algorithmic results presented have been carefully chosen so that they demonstrate the important techniques and tools used in Big Data algorithms, and yet do not require tedious calculations or a very deep mathematical background.
  • Loading...
    Thumbnail Image
    Publication
    Bài giảng Điện tử số
    (2012) Khoa Điện tử - ĐHKTKTCN
  • Loading...
    Thumbnail Image
    Publication
    Bài giảng Kỹ thuật điện tử
    (2011) Khoa Điện tử - ĐHKTKTCN
  • Loading...
    Thumbnail Image
    Publication
    Big Data : Principles and Best Practices of Scalable Realtime Data Systems
    (Manning, 2015) Warren, James; Marz, Nathan
    SummaryBig Data teaches you to build big data systems using an architecture that takes advantage of clustered hardware along with new tools designed specifically to capture and analyze web-scale data. It describes a scalable, easy-to-understand approach to big data systems that can be built and run by a small team. Following a realistic example, this book guides readers through the theory of big data systems, how to implement them in practice, and how to deploy and operate them once they're built.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the BookWeb-scale applications like social networks, real-time analytics, or e-commerce sites deal with a lot of data, whose volume and velocity exceed the limits of traditional database systems. These applications require architectures built around clusters of machines to store and process data of any size, or speed.
  • Loading...
    Thumbnail Image
    Publication
    Big Data For Dummies
    (For Dummies, 2013) Hurwitz, Judith S.; Nugent, Alan; Halper, Fern; Kaufman, Marcia
    Find the right big data solution for your business or organization Big data management is one of the major challenges facing business, industry, and not-for-profit organizations. Data sets such as customer transactions for a mega-retailer, weather patterns monitored by meteorologists, or social network activity can quickly outpace the capacity of traditional data management tools. If you need to develop or manage big data solutions, you'll appreciate how these four experts define, explain, and guide you through this new and often confusing concept. You'll learn what it is, why it matters, and how to choose and implement solutions that work. Effectively managing big data is an issue of growing importance to businesses, not-for-profit organizations, government, and IT professionals Authors are experts in information management, big data, and a variety of solutions Explains big data in detail and discusses how to select and implement a solution, security concerns to consider, data storage and presentation issues, analytics, and much more
  • Loading...
    Thumbnail Image
    Publication
    Blockchain Basics : A Non-Technical Introduction in 25 Steps
    (Apress, 2017) Drescher, Daniel
    In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.What You'll LearnWhat the blockchain isWhy it is needed and what problem it solves
  • Loading...
    Thumbnail Image
    Publication
    Blockchain Security From the Bottom Up : Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts
    (Wiley, 2022) Poston III, Howard E.
    The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant and educator Howard E. Poston delivers an authoritative exploration of blockchain and crypto cybersecurity. In the book, the author shows you exactly how cybersecurity should be baked into the blockchain at every layer of the technology's ecosystem. You'll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution.
  • Loading...
    Thumbnail Image
    Publication
    Các phương pháp làm phẳng khuếch đại quang Raman.
    (2021) Nguyễn, Thị Chung; Bùi, Thị Phượng
    Tổng quan về khuếch đại quang, khuếch đại quan raman, các phương pháp làm phẳng. sử dụng OPTISYSTEM mô phỏng phương pháp làm phẳng khổ khuếch đại quang raman bằng cấu hình đa bơm.
  • Loading...
    Thumbnail Image
    Publication
    CCFP Certified Cyber Forensics Professional All-in-One Exam Guide
    (McGraw Hill, 2015) Easttom, Chuck
    Get complete coverage of all six CCFP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. Written by a leading computer security expert, this authoritative guide fully addresses cyber forensics techniques, standards, technologies, and legal and ethical principles. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. COVERS ALL SIX EXAM DOMAINS: Legal and ethical principles Investigations Forensic science Digital forensics Application forensics Hybrid and emerging technologies ELECTRONIC CONTENT INCLUDES: 250 practice exam questions Test engine that provides full-length practice exams and customized quizzes by chapter or by exam domain
  • Loading...
    Thumbnail Image
    Publication
    CEH V11 : Certified Ethical Hacker Version 11 Practice Tests
    (Sybex, 2022) Messier, Ric
    Master CEH v11 and identify your weak spots CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and skills—you need to pass. These tests cover all section sections of the exam blueprint, allowing you to test your knowledge of Background, Analysis/Assessment, Security, Tools/Systems/Programs, Procedures/Methodology, Regulation/Policy, and Ethics.
  • Loading...
    Thumbnail Image
    Publication
    CEH V12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions
    (Sybex, 2023) Messier, Ric
    The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions Information security and personal privacy remains a growing concern for businesses in every sector. And even as the number of certifications increases, the Certified Ethical Hacker, Version 12 (CEH v12) maintains its place as one of the most sought-after and in-demand credentials in the industry. In CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions, you'll find a comprehensive overview of the CEH certification requirements.
  • Loading...
    Thumbnail Image
    Publication
    CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide
    (McGraw Hill, 2015) Brooks, Charles L.
    An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-Council Get complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource. Written by an expert information security professional and educator, this authoritative guide addresses the tools and techniques required to successfully conduct a computer forensic investigation. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass this challenging exam, this definitive volume also serves as an essential on-the-job reference. CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide covers all exam topics.
  • Loading...
    Thumbnail Image
    Publication
    Circuits, Packets, and Protocols : Entrepreneurs and Computer Communications, 1968-1988
    (ACM Books, 2022) Pelkey, James L.; Russell, Andrew L.; Robbins, Loring G.
    As recently as 1968, computer scientists were uncertain how best to interconnect even two computers. The notion that within a few decades the challenge would be how to interconnect millions of computers around the globe was too far-fetched to contemplate. Yet, by 1988, that is precisely what was happening. The products and devices developed in the intervening years—such as modems, multiplexers, local area networks, and routers—became the linchpins of the global digital society. How did such revolutionary innovation occur? This book tells the story of the entrepreneurs who were able to harness and join two factors: the energy of computer science researchers supported by governments and universities, and the tremendous commercial demand for Internetworking computers.
  • Loading...
    Thumbnail Image
    Publication
    Cloud Computing Basics : A Non-Technical Introduction
    (Apress, 2021) Lisdorf, Anders
    Regardless of where your organization is in your cloud journey, moving to the cloud is an inevitability in the coming years. The cloud is here to stay, and now is the best time to identify optimal strategies to harness the benefits and mitigate the risks. Cloud Computing Basics is the practical, accessible entry point you have been seeking.Get an introduction to the basics of cloud computing and all five major cloud platforms. Author Anders Lisdorf ensures that you gain a fundamental cloud vocabulary and learn how to translate industry terms used by different vendors. Leveraging the economic and security benefits that the cloud provides can look very different for each organization, and Lisdorf uses his expertise to help you adapt your strategy accordingly.
  • Loading...
    Thumbnail Image
    Publication
    Computer Security and Encryption : An Introduction
    (Mercury Learning & Information, 2020) Chauhan, S. R.; Jangra, S.
    Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based.
  • Loading...
    Thumbnail Image
    Publication
    Data Mining : Practical Machine Learning Tools and Techniques
    (Morgan Kaufmann, 2017) Witten, Ian H.; Frank, Eibe; Hall, Mark A.; Pal, Christopher J.
    Data Mining: Practical Machine Learning Tools and Techniques, Fourth Edition, offers a thorough grounding in machine learning concepts, along with practical advice on applying these tools and techniques in real-world data mining situations. This highly anticipated fourth edition of the most acclaimed work on data mining and machine learning teaches readers everything they need to know to get going, from preparing inputs, interpreting outputs, evaluating results, to the algorithmic methods at the heart of successful data mining approaches. Extensive updates reflect the technical changes and modernizations that have taken place in the field since the last edition, including substantial new chapters on probabilistic methods and on deep learning.
  • Loading...
    Thumbnail Image
    Publication
    Data Science and Big Data Analytics : Discovering, Analyzing, Visualizing and Presenting Data
    (Wiley, 2015) EMC Education Services
    Data Science and Big Data Analytics is about harnessing the power of data for new insights. The book covers the breadth of activities and methods and tools that Data Scientists use. The content focuses on concepts, principles and practical applications that are applicable to any industry and technology environment, and the learning is supported and explained with examples that you can replicate using open-source software. This book will help you: Become a contributor on a data science team Deploy a structured lifecycle approach to data analytics problems Apply appropriate analytic techniques and tools to analyzing big data Learn how to tell a compelling story with data to drive business action Prepare for EMC Proven Professional Data Science Certification Get started discovering, analyzing, visualizing, and presenting data in a meaningful way today!
  • Loading...
    Thumbnail Image
    Publication
    Data Warehousing For Dummies
    (Wiley Publishing, 2009) Hammergren, Thomas C.
    Data warehousing is one of the hottest business topics, and there's more to understanding data warehousing technologies than you might think. Find out the basics of data warehousing and how it facilitates data mining and business intelligence with Data Warehousing For Dummies, 2nd Edition. Data is probably your company's most important asset, so your data warehouse should serve your needs. The fully updated Second Edition of Data Warehousing For Dummies helps you understand, develop, implement, and use data warehouses, and offers a sneak peek into their future. You'll learn to: Analyze top-down and bottom-up data warehouse designs Understand the structure and technologies of data warehouses, operational data stores, and data marts Choose your project team and apply best development practices to your data warehousing projects Implement a data warehouse, step by step, and involve end-users in the process Review and upgrade existing data storage to make it serve your needs Comprehend OLAP, column-wise databases, hardware assisted databases, and middleware
  • Loading...
    Thumbnail Image
    Publication
    Deep Learning-Powered Technologies : Autonomous Driving, Artificial Intelligence of Things (AIoT), Augmented Reality, 5G Communications and Beyond
    (Springer, 2023) Mohamed, Khaled Salah
    This book covers various, leading-edge deep learning technologies. The author discusses new applications of deep learning and gives insight into the integration of deep learning with various application domains, such as autonomous driving, augmented reality, AIOT, 5G and beyond.
  • Loading...
    Thumbnail Image
    Publication
    Di động 5G tại Việt Nam từ giải pháp đến triển khai
    (2021) Vũ, Văn Minh; Vũ, Trung Dũng
    Trình bày tổng quan về hệ thống 5S, cơ sở và công nghệ trong mạng di động 5S, giải pháp và phát triển, chất lượng và kết quả triển khai.
  • Loading...
    Thumbnail Image
    Publication
    Điều khiển thay đổi màu sắc trên led RGB qua wifi và Internet
    (2019) Khương, Thị Thắm; Trần, Quang Bách
  • Loading...
    Thumbnail Image
    Publication
    Digital Watermarking and Steganography : Fundamentals and Techniques, Second Edition
    (CRC Press, 2017) Shih, Frank Y.
    This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the global scale of digital multimedia and the rapid growth of the Internet. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Updated techniques and advances in watermarking are explored in this new edition. The combinational spatial and frequency domains watermarking technique provides a new concept of enlarging the embedding capacity of watermarks. The genetic algorithm (GA) based watermarking technique solves the rounding error problem and provide an efficient embedding approach.
  • Loading...
    Thumbnail Image
    Publication
    Định tuyến và gán bước sóng trong mạng WDM sử dụng thuật toán FORD - BELLMAN
    (2019) Hà, Thị Trang; Nguyễn, Mai Anh
  • 1 (current)
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 14
LIBRARY CENTER DIGITAL LIBRARY
Download App
android download appios download app

Contact info

Ha Noi Campus:
  • 1st Floor - HA5 - 454 Minh Khai, Vinh Tuy Ward, Hanoi City
  • 2nd Floor - HA10 - 218 Linh Nam, Hoang Mai Ward, Hanoi City
Ninh Binh Campus:
  • Library Building - 353 Tran Hung Dao, Nam Dinh Ward, Ninh Binh Province
Email: thuvien@uneti.edu.vn

Connect with us

Related websites
Copyright © 2024 UNETI University. All Rights Reserved