Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Power of Algorithms: Inspiration and Examples in Everyday Life
The Power of Algorithms: Inspiration and Examples in Everyday Life

To examine, analyze, and manipulate a problem to the point of designing an algorithm for solving it is an exercise of fundamental value in many fields. With so many everyday activities governed by algorithmic principles, the power, precision, reliability and speed of execution demanded by users have transformed the design and...

A Century of Electrical Engineering and Computer Science at MIT, 1882-1982
A Century of Electrical Engineering and Computer Science at MIT, 1882-1982

The book's text and many photographs introduce readers to the renowned teachers and researchers who are still well known in engineering circles.

Electrical engineering is a protean profession. Today the field embraces many disciplines that seem far removed from its roots in the telegraph, telephone, electric...

PIC Microcontrollers: 50 Projects for Beginners & Experts
PIC Microcontrollers: 50 Projects for Beginners & Experts
This book covers a series of exciting and sensor, radar, a night buzzer, a clock, a VU poetry box.

You can use it as projects book and build clear explanations, schematics, and picture! fun activity.

You can also use it as a study guide. Tl project explains why the project is set up
...
HTML5 Game Development For Dummies
HTML5 Game Development For Dummies
Create games with graphics that pop for the web and mobile devices!

HTML5 is the tool game developers and designers have been eagerly awaiting. It simplifies the job of creating graphically rich, interactive games for the Internet and mobile devices, and this easy-to-use guide simplifies the learning curve. Illustrated in...

Data Mining: A Knowledge Discovery Approach
Data Mining: A Knowledge Discovery Approach
“If you torture the data long enough, Nature will confess,” said 1991 Nobel-winning economist Ronald Coase. The statement is still true. However, achieving this lofty goal is not easy. First, “long enough” may, in practice, be “too long” in many applications and thus unacceptable. Second,...
Reporting with Microsoft SQL Server 2012 (Professional Experience Distilled)
Reporting with Microsoft SQL Server 2012 (Professional Experience Distilled)

Learn to quickly create reports in SSRS and Power View as well as understand the best use of each reporting tool

Overview

  • Empowers a highly visual design experience
  • Increase productivity and proactive intelligence through operational or ad hoc reports
  • Reporting with Microsoft...
PostgreSQL 10 High Performance: Expert techniques for query optimization, high availability, and efficient database maintenance
PostgreSQL 10 High Performance: Expert techniques for query optimization, high availability, and efficient database maintenance

Leverage the power of PostgreSQL 10 to design, administer and maintain a high-performance database solution

Key Features

  • Obtain optimal PostgreSQL 10 database performance, ranging from initial design to routine maintenance
  • Fine tune the performance of your queries and...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
It is now possible to predict the future when it comes to crime. In Data Mining and Predictive Analysis, Dr. Colleen McCue describes not only the possibilities for data mining to assist law enforcement professionals, but also provides real-world examples showing how data mining has identified crime trends, anticipated community...
Municipal Solid Waste Incinerator Residues (Studies in Environmental Science)
Municipal Solid Waste Incinerator Residues (Studies in Environmental Science)
The International Ash Working Group (IAWG) was established in 1989 to conduct an in-depth review of the existing scientific data and develop a state-of-knowledge treatise on MSW incinerator residue characterisation, disposal, treatment and utilisation. The topics of operator and worker health and safety, and health risk assessment...
Handbook of Numerical Analysis : Special Volume: Foundations of Computational Mathematics
Handbook of Numerical Analysis : Special Volume: Foundations of Computational Mathematics
A long time ago, when younger and rasher mathematicians, we both momentarily harboured the ambition that one day, older and wiser, we might write a multivolume treatise titled “On the Mathematical Foundations of Numerical Analysis”. And then it dawned that such a creation already exists: it is called ‘a mathematics library’....
Intelligent Positioning: GIS-GPS Unification
Intelligent Positioning: GIS-GPS Unification
Satellite positioning and computerised spatial data have transformed the way in which many areas of research and commercial activity are conducted. The combination of GIS and GPS is used for a broad spectrum of experiments.

This book provides technical overview of GIS, GPS and their integration, before focusing on a selection of R&D...

Result Page: 55 54 53 52 51 50 49 48 47 46 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy