Home | Amazing | Today | Tags | Publishers | Years | Search 
Digital Watermarking for Digital Media
Digital Watermarking for Digital Media
Digital media, like audio, video, images, and other multimedia documents, can be protected against copyright infringements with invisible, integrated patterns. Such methods are based on steganography and digital watermarking techniques. Most watermarks are inserted as a plain-bit or adjusted digital signal using a key-based embedding algorithm. The...
Implicit Objects Computer Graphics
Implicit Objects Computer Graphics
Implicit definition and description of geometric objects and surfaces plays a critical role in the appearance and manipulation of computer graphics. In addition, the mathematical definition of shapes, using an implicit form, has pivotal applications for geometric modeling, visualization and animation. Until recently, the parametric form has been...
Application of Agents and Intelligent Information Technologies
Application of Agents and Intelligent Information Technologies
The Web has sparked renewed interest in developing intelligent information systems that enable users to accomplish complex tasks in Web-centric environments with relative ease. Although artificially intelligent (AI) technologies such as expert systems and neural networks have been successfully used in aerospace, communication, medical, and...
Evolvable Machines: Theory & Practice (Studies in Fuzziness and Soft Computing)
Evolvable Machines: Theory & Practice (Studies in Fuzziness and Soft Computing)
"Evolutionary algorithms are one of the very promising developments in Computer Science that can solve difficult problems … . The presented book is an excellent example for the successful application of these methods to the Design of Machines … . A very interesting book, highly recommendable for scientists interested in evolvable...
Digital Design of Nature: Computer Generated Plants and Organics (X.media.publishing)
Digital Design of Nature: Computer Generated Plants and Organics (X.media.publishing)
What is computer graphics and what are the conceptual tasks of research in this area? To the average person the term still conveys more or less the design of logos and the manipulation of pictures with the help of image-editing programs. However, during the past four decades, computer graphics has evolved into an innovative multifaceted field of...
Computer Security and Cryptography
Computer Security and Cryptography

Gain the skills and knowledge needed to create effective data security systems

This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect...

Cryptography for Internet & Database Applications
Cryptography for Internet & Database Applications
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest...
Fuzzy Chaotic Systems: Modeling, Control, and Applications (Studies in Fuzziness and Soft Computing)
Fuzzy Chaotic Systems: Modeling, Control, and Applications (Studies in Fuzziness and Soft Computing)
Bringing together the two seemingly unrelated concepts, fuzzy logic and chaos theory, is primarily motivated by the concept of soft computing (SC), initiated by Lotfi A. Zadeh, the founder of fuzzy set theory. The principal constituents of SC are fuzzy logic (FL), neural network theory (NN) and probabilistic reasoning (PR), with the latter...
Introduction to Computational Biology: An Evolutionary Approach
Introduction to Computational Biology: An Evolutionary Approach
In 1982, the first release of the GenBank sequence database contained 601,438 residues. By 2005, this number had grown beyond and continues to increase exponentially. Far from regarding this as “information overload”, we believe the free availability of so much precise and fundamental data on the ultimate constituents of life to be the...
Biometrics, Computer Security Systems and Artificial Intelligence Applications
Biometrics, Computer Security Systems and Artificial Intelligence Applications
This book presents the most recent achievements in the field of a very fast developing Computer Science. It is a very fascinating science, which still encompasses a number of uncovered areas of study with urgent problems to be solved. Therefore, thousands of scientists are dealing with it elaborating on more and more practical and efficient...
Computational Text Analysis: For Functional Genomics and Bioinformatics
Computational Text Analysis: For Functional Genomics and Bioinformatics
This book brings together the two disparate worlds of computational text analysis and biology and presents some of the latest methods and applications to proteomics, sequence analysis, and gene expression data. Modern genomics generates large and comprehensive data sets but their interpretation requires an understanding of a vast number of genes,...
An Introduction to Quantum Computing
An Introduction to Quantum Computing
This concise, accessible text provides a thorough introduction to quantum computing - an exciting emergent field at the interface of the computer, engineering, mathematical and physical sciences. Aimed at advanced undergraduate and beginning graduate students in these disciplines, the text is technically detailed and is clearly illustrated...
Result Page: 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy