Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fuzzy Systems Engineering: Theory and Practice (Studies in Fuzziness and Soft Computing)
Fuzzy Systems Engineering: Theory and Practice (Studies in Fuzziness and Soft Computing)

This book is devoted to reporting innovative and significant progress in fuzzy system engineering. Given the maturation of fuzzy logic, this book is dedicated to exploring the recent breakthroughs in fuzziness and soft computing in favour of intelligent system engineering. This monograph presents novel developments of the fuzzy theory as well as...

Exploring Scanning Probe Microscopy with MATHEMATICA
Exploring Scanning Probe Microscopy with MATHEMATICA
This second edition of the book Exploring Scanning Probe Microscopy with Mathematica is a revised and extended version of the first edition. It consists of a collection of self-contained, interactive, computational examples from the fields of scanning tunneling microscopy, scanning force microscopy, and related technologies, using Mathematica...
Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)
Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)

Few technical lerms have gained such rapid notoriety as the appela tion "NP-complete." In the short lime since its introduction in the early 1970's, this term has come to symbolize the abyss of inherent intractability that algorithm designers increasingly face as they seek to solve larger and more complex problems. A...

Understanding Search Engines: Mathematical Modeling and Text Retrieval (Software, Environments, Tools), Second Edition
Understanding Search Engines: Mathematical Modeling and Text Retrieval (Software, Environments, Tools), Second Edition
“There is no other information retrieval/search book where the heart is the mathematical foundations. This book is greatly needed to further establish information retrieval as a serious academic, as well as practical and industrial, area." ---Jaime Carbonell, Carnegie Mellon University. “Berry and Browne describe most of what...
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1

The TITLE of Volume 4 is Combinatorial Algorithms, and when I proposed it I was strongly inclined to add a subtitle: The Kind of Programming I Like Best. Mv editors have decided to tone down such exuberance, but the fact remains that programs with a combinatorial flavor have always been my favorites.

On the other hand I've...

Artificial Intelligence in Recognition and Classification of Astrophysical and Medical Images (Studies in Computational Intelligence)
Artificial Intelligence in Recognition and Classification of Astrophysical and Medical Images (Studies in Computational Intelligence)
During the past decade digital imaging has significantly progressed in all imaging areas ranging from medicine, pharmacy, chemistry, biology to astrophysics, meteorology and geophysics. The avalanche of digitized images produced a need for special techniques of processing and knowledge extraction from many digital images with...
Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
In a broad sense, speech dynamics are time-varying or temporal characteristics in all stages of the human speech communication process. This process, sometimes referred to as speech chain [1], starts with the formation of a linguistic message in the speaker’s brain and ends with the arrival of the message in the...
Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...

Data Provenance and Data Management in eScience (Studies in Computational Intelligence)
Data Provenance and Data Management in eScience (Studies in Computational Intelligence)

This book covers important aspects of fundamental research in data provenance and data management(DPDM), including provenance representation and querying, as well as practical applications in such domains as clinical trials, bioinformatics and radio astronomy.

...
Machine vision – applications and systems
Machine vision – applications and systems

Vision plays a fundamental role for living beings by allowing them to interact with the environment in an effective and efficient way. The Machine Vision goal is to endow computing devices, and more generally artificial systems, with visual capabilities in order to cope with not a priori predetermined situations. To this end, we have to take...

Smart Intelligent Computing and Applications: Proceedings of the Second International Conference on SCI 2018, Volume 2 (Smart Innovation, Systems and Technologies (105))
Smart Intelligent Computing and Applications: Proceedings of the Second International Conference on SCI 2018, Volume 2 (Smart Innovation, Systems and Technologies (105))

The proceedings covers advanced and multi-disciplinary research on design of smart computing and informatics. The theme of the book broadly focuses on various innovation paradigms in system knowledge, intelligence and sustainability that may be applied to provide realistic solution to varied problems in society, environment and...

Data Mining Using SAS Enterprise Miner (Wiley Series in Computational Statistics)
Data Mining Using SAS Enterprise Miner (Wiley Series in Computational Statistics)
Data Mining Using SAS Enterprise Miner introduces the readers to data mining using SAS Enterprise Miner v4. This book will reveal the power and ease of use of the powerful new module in SAS that will introduce the readers to the various configuration settings and subsequent results that are generated from the various nodes in Enterprise Miner that...
unlimited object storage image
Result Page: 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy