Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Mining Patterns: New Methods and Applications
Data Mining Patterns: New Methods and Applications
Since its definition a decade ago, the problem of mining patterns is becoming a very active research area, and efficient techniques have been widely applied to problems either in industry, government or science. From the initial definition and motivated by real applications, the problem of mining patterns not only addresses the finding of itemsets...
IT Governance: How Top Performers Manage IT Decision Rights for Superior Results
IT Governance: How Top Performers Manage IT Decision Rights for Superior Results
Firms with superior IT governance have more than 25% higher profits than firms with poor governance given the same strategic objectives. These top performers have custom-designed IT governance for their strategies. Just as corporate governance aims to ensure quality decisions about all corporate assets, IT governance links IT decisions with company...
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making...

Beginning VB.NET 2003
Beginning VB.NET 2003

Three expert authors guide you through the basics of building working applications, creating windows and boxes, handling unexpected events, using object-oriented programming, and more. You’ll learn to use menus, toolbars, dialog boxes, and other controls in Windows applications, and how loops and branching structures function in...

Design of Energy-Efficient Application-Specific Instruction Set Processors
Design of Energy-Efficient Application-Specific Instruction Set Processors
After a brief introduction to low-power VLSI design, the design space of ASIP instruction set architectures (ISAs) is introduced with a special focus on important features for digital signal processing. Based on the degrees of freedom offered by this design space, a consistent ASIP design flow is proposed: this design flow starts with a given...
Microsoft Office Access 2003: The Complete Reference
Microsoft Office Access 2003: The Complete Reference

The Definitive Resource on Access 2003

CD-ROM contains quick reference section on Access 2003--plus sample database files that support the book's material

Scale mountains of data with a single application with the help of this comprehensive resource. Through detailed, step-by-step instructions, you'll learn how to design and...

Advanced Data Mining Techniques
Advanced Data Mining Techniques
This book covers the fundamental concepts of data mining, to demonstrate the potential of gathering large sets of data, and analyzing these data sets to gain useful business understanding. The book is organized in three parts. Part I introduces concepts. Part II describes and demonstrates basic data mining algorithms. It also contains chapters on a...
Fuzzy Algorithms for Control (International Series in Intelligent Technologies)
Fuzzy Algorithms for Control (International Series in Intelligent Technologies)

Fuzzy Algorithms for Control gives an overview of the research results of a number of European research groups that are active and play a leading role in the field of fuzzy modeling and control. It contains 12 chapters divided into three parts.

Chapters in the first part address the position of fuzzy systems in control...

Principles of Information Security
Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the smooth operation of communication and computing solutions becomes vital. However, recurring events such as virus and worm attacks and the success of criminal attackers illustrate the weaknesses in current information technologies and the...
Managerial Accounting: Tools for Business Decision Making
Managerial Accounting: Tools for Business Decision Making

This book does not Include Access code
Weygandt, Managerial Accounting, 6th Edition gives students the tools they need to succeed, whether as accountants or in other career paths. The authors present the fundamental concepts of managerial accounting in an easy-to-understand fashion in a decision-making
...

Think Bayes
Think Bayes

If you know how to program with Python and also know a little about probability, you’re ready to tackle Bayesian statistics. With this book, you'll learn how to solve statistical problems with Python code instead of mathematical notation, and use discrete probability distributions instead of continuous mathematics. Once you...

Keras Reinforcement Learning Projects: 9 projects exploring popular reinforcement learning techniques to build self-learning agents
Keras Reinforcement Learning Projects: 9 projects exploring popular reinforcement learning techniques to build self-learning agents

A practical guide to mastering reinforcement learning algorithms using Keras

Key Features

  • Build projects across robotics, gaming, and finance fields, putting reinforcement learning (RL) into action
  • Get to grips with Keras and practice on real-world unstructured...
unlimited object storage image
Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy