Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Circuits, Signals, and Speech and Image Processing (The Electrical Engineering Handbook Third Edition)
Circuits, Signals, and Speech and Image Processing (The Electrical Engineering Handbook Third Edition)

The purpose of The Electrical Engineering Handbook, 3rd Edition is to provide a ready reference for the practicing engineer in industry, government, and academia, as well as aid students of engineering. The third edition has a new look and comprises six volumes including:

Circuits, Signals, and Speech and Image Processing...

Sparse Representations and Compressive Sensing for Imaging and Vision (SpringerBriefs in Electrical and Computer Engineering)
Sparse Representations and Compressive Sensing for Imaging and Vision (SpringerBriefs in Electrical and Computer Engineering)

Compressed sensing or compressive sensing is a new concept in signal processing where one measures a small number of non-adaptive linear combinations of the signal.  These measurements are usually much smaller than the number of samples that define the signal.  From these small numbers of measurements, the signal is then...

Scala for Machine Learning
Scala for Machine Learning

Leverage Scala and Machine Learning to construct and study systems that can learn from data

About This Book

  • Explore a broad variety of data processing, machine learning, and genetic algorithms through diagrams, mathematical formulation, and source code
  • Leverage your expertise in Scala...
Breakthrough Discoveries in Information Technology Research: Advancing Trends
Breakthrough Discoveries in Information Technology Research: Advancing Trends

This collection, entitled Breakthrough Discoveries in Information Technology Research: Advancing Trends , aims to inform researchers and practitioners of novel and emerging research in information science and technology, allowing for the discussion and dissemination of critical concepts that will promote further study and innovation....

How Personal & Internet Security Works (How It Works)
How Personal & Internet Security Works (How It Works)

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft...

The InfoSec Handbook: An Introduction to Information Security
The InfoSec Handbook: An Introduction to Information Security

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.

It is intended mainly for beginners to the field of...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical...

Biometrics For Dummies (Computer/Tech)
Biometrics For Dummies (Computer/Tech)
Biometric technology is a HOT topic. The most recent (ISC)2 Global Workforce Survey of over 7,500 security professionals from around the world have cited biometrics as the number one security project for organizations in North America, and the number two security project in the world overall.

Most companies aren’t using any form of
...
Handbook of Pattern Recognition and Computer Vision
Handbook of Pattern Recognition and Computer Vision

Dedicated to the memory of the late Professor King Sun Fu (1930-1985), the handbook series, with first edition (1993), second edition (1999) and third edition (2005), provides a comprehensive, concise and balanced coverage of the progress and achievements in the field of pattern recognition and computer vision in the last twenty years. This is a...

Credibility Assessment: Scientific Research and Applications
Credibility Assessment: Scientific Research and Applications

In 2001, the late Murray Kleiner and an array of experts contributed to the Handbook of Polygraph Testing, published by Elsevier, which examined the fundamental principles behind polygraph tests and reviewed the key tests and methods used at that time. In the intervening thirteen years, the field has moved beyond traditional polygraph...

Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)
Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)

An in-depth examination of the cutting edge of biometrics

This book fills a gap in the literature by detailing the recent advances and emerging theories, methods, and applications of biometric systems in a variety of infrastructures. Edited by a panel of experts, it provides comprehensive coverage of:

Result Page: 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy