Home | Amazing | Today | Tags | Publishers | Years | Search 
Sensitivity Analysis for Neural Networks (Natural Computing Series)
Sensitivity Analysis for Neural Networks (Natural Computing Series)

Artificial neural networks are used to model systems that receive inputs and produce outputs. The relationships between the inputs and outputs and the representation parameters are critical issues in the design of related engineering systems, and sensitivity analysis concerns methods for analyzing these relationships. Perturbations of neural...

Low-Power Design of Nanometer FPGAs: Architecture and EDA (Systems on Silicon)
Low-Power Design of Nanometer FPGAs: Architecture and EDA (Systems on Silicon)
Low-Power Design of Nanometer FPGAs Architecture and EDA is an invaluable reference for researchers and practicing engineers concerned with power-efficient, FPGA design. State-of-the-art power reduction techniques for FPGAs will be described and compared. These techniques can be applied at the circuit, architecture, and...
Intelligent Systems for Automated Learning and Adaptation: Emerging Trends and Applications
Intelligent Systems for Automated Learning and Adaptation: Emerging Trends and Applications
Intelligent Systems for Automated Learning and Adaptation: Emerging Trends and Applications presents methodologies, architectures, and approaches on experiential automated learning. This critical mass of sought after research assembles the most intriguing and innovative applications, advancements, and leading studies on the...
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
This self-study exam preparation guide for the CEH Certified Ethical Hacker certification exam contains everything you need to test yourself and pass the Exam. All Exam topics are covered and insider secrets, complete explanations of all CEH Certified Ethical Hacker subjects, test tricks and tips, numerous highly realistic sample questions, and...
A Dictionary of Real Numbers
A Dictionary of Real Numbers
How do we recognize that the number .93371663... is actually 21og1 0(e + 7r)/2 ? Gauss observed that the number 1.85407467... is (essentially) a rational value of an elliptic integral—an observation that was critical in the development of nineteenth century analysis. How do we decide that such a number is actually a special value of a...
Introducing Windows Azure
Introducing Windows Azure

Windows Azure is Microsoft's next-generation cloud-computing operating system and is designed to provide companies with new business opportunities as they migrate toward hosted services.

Introducing Microsoft Azure provides all the information developers need to get started with this new technology and apply it across...

Linux iptables Pocket Reference
Linux iptables Pocket Reference
Firewalls, Network Address Translation (NAT), and network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered on Linux and makes Linux an extremely flexible system for any kind of network filtering...
Populations, Public Health, and the Law
Populations, Public Health, and the Law
Law plays a crucial role in protecting the health of populations. Whether the public health threat is bioterrorism, pandemic influenza, obesity, or lung cancer, law is an essential tool for addressing the problem. Yet for many decades, courts and lawyers have frequently overlooked law's critical importance to public health. "Populations,...
How to Write Fast Under Pressure
How to Write Fast Under Pressure
Anyone who regularly deals with work-related writing deadlines knows the kind of paralysis that can take over when there's too much to accomplish and not enough time to compose a clear sentence. This book contains an easy, efficient, and confidence-building process for keeping up and being productive, even under tight time constraints and...
Scalable Fuzzy Algorithms for Data Management and Analysis: Methods and Design
Scalable Fuzzy Algorithms for Data Management and Analysis: Methods and Design
Today, fuzzy methods are of common use as they provide tools to handle data sets in a relevant, robust, and interpretable way, making it possible to cope with both imprecision and uncertainties. Scalable Fuzzy Algorithms for Data Management and Analysis: Methods and Design presents up-to-date techniques for addressing data...
Smart Information and Knowledge Management: Advances, Challenges, and Critical Issues (Studies in Computational Intelligence)
Smart Information and Knowledge Management: Advances, Challenges, and Critical Issues (Studies in Computational Intelligence)

New approaches are needed that could move us towards developing effective applicable intelligent systems for problem solving and decision making, One of the main efforts in intelligent systems development is focused on knowledge and information management which is regarded as the crucial issue in smart decision making support. The 14 Chapters of...

ModSecurity 2.5
ModSecurity 2.5
With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you...
Result Page: 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy