Welcome to Academic Publishing House!
EN
ES
Login
Welcome
Mission
Submit a Manuscript
services
Reviewers
FAQ
About Eliva Press
Contact
Login
EN
ES
Welcome
Mission
Submit a Manuscript
services
Reviewers
FAQ
About Eliva Press
Contact
Books
Home
Books
Books
FILTER BY PRICE
Price:
FILTER
PRODUCT CATEGORIES
Law
Agriculture
Chemistry
Anthropology
Management
Finance
Environmental Studies
Urban Studies and Planning
Social Science
Technology and Engineering
Science
Technology
Language arts and Disciplines
Sports and Recreation
Psyhology
Political Science
Philosophy
Nature
Architecture
Mathematics
History
Health and Fitness
Foreing language study
Education
Design
Health Care, Medicine
Computer Science
Business and Economics
Religion
Art
Other
Biology
New Release
Best sellers
Tourism
Geology
Default sorting
Sort by popularity
Sort by rating
Sort by newness
Sort by price: low to high
Sort by price: high to low
Victor Oluseyi Olaleye
An Improved Mathematical Predator - Prey M...
An Improved Mathematical Predator - Prey Model
by Victor Oluseyi Olaleye (Author), Omotosho L.O. (Author), Olayiwola M.O. (Author) The Lotka-Volterra equations were developed to describe the dynamics of biological systems, one specie is the pre...
$ 32.5
buy
Mrs. Kavita
Theoretical Method Towards Computational D...
Theoretical Method Towards Computational Difficulty of Cracking Transportation Problems
In today's world, transportation plays an important role in everyone's life. It is not showing its impact only on economic status but also improving the quality of life. Transportation devices...
$ 42.5
buy
Pushpender Sarao
Data Science and Visualization: Lecture No...
Data Science and Visualization: Lecture Notes and Laboratory Manual
Data Visualizations is the subset of Data Science. This book focuses on using the python programming language in Google colab and Kaggle to perform data manipulation and cleaning, create effective vis...
$ 60
buy
Wei Fang
Research on the Application of Artificial ...
Research on the Application of Artificial Intelligence in Meteorology
Artificial intelligence (AI) has become widely used in a variety of fields, including disease prediction, environmental monitoring, and pollutant prediction. In recent years, there has also been an in...
$ 54.5
buy
Jingxuan Fu
Future Development and Regulations of Meta...
Future Development and Regulations of Metaverse and NFTs in China
This book will discuss the concepts of Metaverse and NFTs, which are currently under intense discussion. There are a lot of opportunities to explore in this field, but at the same time, the developmen...
$ 38.5
buy
Umar Ahmad Muhammad
Influence of ICT in the ...
Influence of ICT in the Post-Pandemic Era
The sudden outbreak of corona virus disease in 2019 (also known as Covid-19) which originated from the city ofWuhan, China, has become a major public health challenge for not only China but also count...
$ 38.5
buy
Mary Adu Kumi
The Functionality of Learner-Based Video C...
The Functionality of Learner-Based Video Communication System Design
Current Learner-based video communication designs involve human-machine relationships that involve communication between actors at different hierarchical levels, either vertically in a top-down or bot...
$ 60
buy
M. Bhuvana
IDENTIFYING TOURISM DESTINATION ...
IDENTIFYING TOURISM DESTINATION AMONG CUSTOMERS THROUGH ADOPTING TOURISM MOBILE APPLICATION
Technology will be a crucial component to restore confidence and enable a new era of safe, seamless, and touchless travel in a post-COVID-19 world. In the past, we have experienced that the impact of ...
$ 42.5
buy
Kartik Rathi
A Review of State-of-the-art Automatic Tex...
A Review of State-of-the-art Automatic Text Summarisation
Text summarisation comes under the domain of Natural Language Processing (NLP), which entails replacing a long, precise and concise text with a shorter, precise and concise one. Manual text summarisin...
$ 38.5
buy
Dipanjan Das
An Identity Based Encryption Scheme Resili...
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks: Glassbox Secure IBE
The modern software ecosystem is data-centric. Data exfiltration due to the attacks of memory scraper-type malware is an emerging threat. RAM Scrapers are data-harvesting malware that collects data fr...
$ 38.5
buy
Seelam Ch Vijaya Bhaskar
Methods to Enhance QoS in ...
Methods to Enhance QoS in Wireless Sensor Networks: Concepts, Applications, Experimentation and Analysis to Improve QoS
The objective of this research is to focus on handling QoS for Wireless Sensor Network (WSN). Packet dropping and modifying is common attack in wireless sensor networks. These attacks interrupt the co...
$ 42.5
buy
Yiqiao Yin
Towards Explainable Artificial ...
Towards Explainable Artificial Intelligence Using Interaction-Based Representation Learning
The field of eXplainable Artificial Intelligence (XAI) aims to dissect robust “blackbox” algorithms such as Convolutional Neural Networks (CNNs) that are known for making human-level predi...
$ 64.5
buy
Maniyassouwe Amana
Value Creation and Capture with Big Data i...
Value Creation and Capture with Big Data in Smart Phones Companies
With the advent of social media, the volume of data generated on the Internet has exploded due to the growing number of social network users and their interactions on the Internet. Given that, in the ...
$ 38.5
buy
Anju Bala
Implement and Designing of Effective and S...
Implement and Designing of Effective and Security Management Architecture for IOT
The emerging trends on the Internet and embedded technologies have enabled the surrounding objects to interconnect with one another. Here, which envisions a future where IoT equipment are going to be ...
$ 42.5
buy
Hiram Calvo
Unleashing the Power of Syntactic N-Grams:...
Unleashing the Power of Syntactic N-Grams: A Solution for Explainable Cognitive Linguistics
Recently Natural Language Processing has seen the rise of computationally expensive (although effective) technologies to deal with the nuances of language. While traditional approaches seem to be less...
$ 64.5
buy
Gopi Battineni
Early Dementia Detection Among Older Adult...
Early Dementia Detection Among Older Adults by Artificial Intelligence Algorithms: Role and Application of AI in Dementia Diagnosis
Dementia disorders among old people represent a challenge for modern medicine. Alzheimer’s disease (AD) represents the most diffused form of adult-onset dementia. For half a century, the diagnos...
$ 42.5
buy
Yiqiao Yin
Fundamentals of Interaction-Based Learning...
Fundamentals of Interaction-Based Learning: An Efficient, Explainable, and Extremely Predictive Machine Learning Tool for Data Scientists
In the field of eXplainable AI (XAI), robust “blackbox” algorithms such as Convolutional Neural Networks (CNNs) are known for making high prediction performance. However, the ability to ex...
$ 49.5
buy
Anabela Marto
SensiMAR: A Multisensory Mobil...
SensiMAR: A Multisensory Mobile Augmented Reality Study for Cultural Heritage
This document aims to ascertain how multisensory augmented reality impacts visitors’ experience regarding their presence, enjoyment, knowledge, value of the experience, when visiting a cultural ...
$ 64.5
buy
Sindhuja M.
Energy Efficient Techniques to Improve the...
Energy Efficient Techniques to Improve the Lifetime of Wireless Networks
Nowadays, most of our day to day applications rely upon futuristic wireless networks starting from home appliances, healthcare, environment monitoring and even up to battlefield surveillance. The wire...
$ 36.5
buy
Sufyan Al-Janabi
Selected Topics in Information Security Re...
Selected Topics in Information Security Research and Teaching
Information security is usually considered as the set of practices intended to keep data secure from unauthorized access or alterations, both when it is being stored and when it is being transmitted t...
$ 60
buy
1
2
3
4
...
6
Get up to 50% Royalties
more info