Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fuzzy Optimization: Recent Advances and Applications (Studies in Fuzziness and Soft Computing)
Fuzzy Optimization: Recent Advances and Applications (Studies in Fuzziness and Soft Computing)
Optimization is an extremely important area in science and technology which provides powerful and useful tools and techniques for the formulation and solution of a multitude of problems in which we wish, or need, to find a best possible option or solution. It has been an important area of research for more than half a century,...
Mechatronic Systems: Analysis, Design and Implementation
Mechatronic Systems: Analysis, Design and Implementation
Nowadays most of the systems are computer controlled among them we quote mechatronic systems where the intelligence is implemented in microcontrollers. The discipline that deals with such systems is mechatronics that we define as the synergistic combination of mechanical engineering, electronic engineering, and software...
Introduction to Software Process Improvement (Undergraduate Topics in Computer Science)
Introduction to Software Process Improvement (Undergraduate Topics in Computer Science)
The objective of this book is to give an introduction to the software process improvement field to computer science students. The well-known Capability Maturity Model Integration (CMMI1) is used as the vehicle for software process improvement as it has become the de facto standard2 for implementing best practice in software...
Fuzzy-Like Multiple Objective Decision Making (Studies in Fuzziness and Soft Computing)
Fuzzy-Like Multiple Objective Decision Making (Studies in Fuzziness and Soft Computing)
Everyday people need to make decisions, and the decision makers usually face multiple, conflicting objectives and uncertain environments. The research about uncertain multi-objective decision making problems has been profolic. It mainly provides decision makers with the help to find optimal solutions for many objectives under...
Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010
Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010

These proceedings contain the papers presented at the 8th Internationl Symposium on Automated Technology for Verification and Analysis held during September 21–24, 2010 in Singapore. The primary objective of the ATVA conferences remains the same: to exchange and promote the latest advances of state-of-the-art research on...

Modular Neural Networks and Type-2 Fuzzy Systems for Pattern Recognition (Studies in Computational Intelligence)
Modular Neural Networks and Type-2 Fuzzy Systems for Pattern Recognition (Studies in Computational Intelligence)

We describe in this book, hybrid intelligent systems using type-2 fuzzy logic and modular neural networks for pattern recognition applications. Hybrid intelligent systems combine several intelligent computing paradigms, including fuzzy logic, neural networks, and bio-inspired optimization algorithms, which can be used to produce...

Introduction to Cryptography (Undergraduate Texts in Mathematics)
Introduction to Cryptography (Undergraduate Texts in Mathematics)

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Fuzzy Logic in Financial Analysis (Studies in Fuzziness and Soft Computing)
Fuzzy Logic in Financial Analysis (Studies in Fuzziness and Soft Computing)

With ever increasing frequency, financial studies in business are acquiring greater importance in the field of management as a consequence of the complexity of the problems arising in present day society. The old treaties that included certain aspects on the raising and placing of payment means have been relegated to history, leaving the way...

Logical Aspects of Computational Linguistics: 6th International Conference, LACL 2011
Logical Aspects of Computational Linguistics: 6th International Conference, LACL 2011

This volume contains the proceedings of the 6th International Conference on Logical Aspects of Computational Linguistics 2011 (LACL 2011), held June 29- July 1, 2011 in Montpellier, France. The LACL conferences aim at providing a forum for the presentation and discussion of current research in all the formal and logical aspects of...

Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

Web Application Security: Iberic Web Application Security Conference, IBWAS 2009
Web Application Security: Iberic Web Application Security Conference, IBWAS 2009

IBWAS 2009, the Iberic Conference on Web Applications Security, was the first international conference organized by both the OWASP Portuguese and Spanish chapters in order to join the international Web application security academic and industry communities to present and discuss the major aspects of Web applications security.

...

Scheduling: Theory, Algorithms, and Systems
Scheduling: Theory, Algorithms, and Systems

Sequencing and scheduling is a formof decision-making that plays a crucial role in manufacturing and service industries. In the current competitive environment effective sequencing and scheduling has become a necessity for survival in the market-place. Companies have to meet shipping dates that have been committed to customers, as failure to...

Result Page: 403 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy