Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer-aided Analysis of Active Circuits (Electrical and Computer Engineering)
Computer-aided Analysis of Active Circuits (Electrical and Computer Engineering)
Who could imagine today an electronic engineer designing an intergrated circuit using the classical "paper-and-pencil" method? The new technologies permit the fabrication of large systems containng complex building blocks satisfying tight specifications. Having thousands of interconnected transistors on a single chip is commonplace today....
Alternate Data Storage Forensics
Alternate Data Storage Forensics
Digital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital...
Fingerprints and Other Ridge Skin Impressions (International Forensic Science and Investigation Series)
Fingerprints and Other Ridge Skin Impressions (International Forensic Science and Investigation Series)
Our aim with this book was to place, under the same roof, two distinct but intertwined aspects of the use of fingerprinting for personal identification and criminal investigation: (1) the aspects associated with the visualization, detection, and recording of friction ridge skin impressions and (2) the issues regarding the identification or...
Investment Risk Management (The Wiley Finance Series)
Investment Risk Management (The Wiley Finance Series)
Risk has two sides: underestimating it harms the investor, while overestimating it prevents the implementation of bold business projects. This book explains, from the point of view of the practitioner, the analysis of investment risk - a proper account of adequate risk management strategies - and offers an objective and readable account of the most...
Beginning Perl for Bioinformatics
Beginning Perl for Bioinformatics
With its highly developed capacity to detect patterns in data, Perl has become one of the most popular languages for biological data analysis. But if you're a biologist with little or no programming experience, starting out in Perl can be a challenge. Many biologists have a difficult time learning how to apply the language to bioinformatics. The...
Bioinformatics: Problem Solving Paradigms
Bioinformatics: Problem Solving Paradigms
There are fundamental principles for problem analysis and algorithm design that are continuously used in bioinformatics. This book concentrates on a clear presentation of these principles, presenting them in a self-contained, mathematically clear and precise manner, and illustrating them with lots of case studies from main fields of bioinformatics...
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
The book is organized in four major areas. The first unit focuses on the terrorism informatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The fourth unit presents surveillance and emergency response.

Readers will find the book...

Trading for a Living: Psychology, Trading Tactics, Money Management
Trading for a Living: Psychology, Trading Tactics, Money Management
An eminent futures trader explores crucial factors in the markets that most experts overlook--time, volume and open interest--and describes little-known indicators to profitably track them. Covers all the popular technical approaches to futures, options and stock markets including Elliott Wave, oscillators, moving averages, Market Logic,...
Networked Control Systems: Theory and Applications
Networked Control Systems: Theory and Applications
Networked control systems (NCS) consist of sensors, actuators and controllers the operations of which may be distributed over geographically disparate locations and co-ordinated by the exchange of information passed over a communication network. The communication network may be physically wired or not. The widespread applications of the Internet...
Topological Algorithms for Digital Image Processing (Machine Intelligence and Pattern Recognition)
Topological Algorithms for Digital Image Processing (Machine Intelligence and Pattern Recognition)
Objects in three dimensions, and their two-dimensional images, are approximated digitally by sets of voxels ("volume elements") or pixels ("picture elements"), respectively. Digital geometry is the study of geometric properties of digitized objects (or digitized images of objects); it deals both with the definitions of such...
Neural Networks and Pattern Recognition
Neural Networks and Pattern Recognition
This book is one of the most up-to-date and cutting-edge texts available on the rapidly growing application area of neural networks. Neural Networks and Pattern Recognition focuses on the use of neural networksin pattern recognition, a very important application area for neural networks technology. The contributors are widely known...
Security Modeling And Analysis of Mobile Agent Systems (Electrical and Computer Engineering)
Security Modeling And Analysis of Mobile Agent Systems (Electrical and Computer Engineering)
Computer systems have evolved from early centralized computing systems into distributed computing systems. Distributed computing paradigms have also experienced a development from client-server paradigm to current mobile agent paradigm. Traditionally, Remote Procedure Call (RFC) is used in client-server paradigm. A client sends data to its server...
Result Page: 380 379 378 377 376 375 374 373 372 371 370 369 368 367 366 365 364 363 362 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy