Home | Amazing | Today | Tags | Publishers | Years | Search 
Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions
Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions

Ensemble methods have been called the most influential development in Data Mining and Machine Learning in the past decade. They combine multiple models into one usually more accurate than the best of its components. Ensembles can provide a critical boost to industrial challenges -- from investment timing to drug discovery, and fraud detection...

Machine Vision
Machine Vision

This book grew out of our efforts to provide a balanced coverage of essential elements of machine vision systems to students in our undergraduate and early graduate classes. The field of machine vision, or computer vision, has been growning at a fast face. The growth in this field, unlike most established fields, has been both in breadth and...

Computational Fluid Dynamics in Practice
Computational Fluid Dynamics in Practice

Computational Fluid Dynamics in Practice explores the current and future developments in CFD, with the authors detailing advanced applications and case studies to demonstrate successes, illustrate the limitations, and identify methods for good practice. Designers, engineers, and researchers working in this field of fluid mechanics will...

Forensic Science
Forensic Science

This is a comprehensive reference source on the theory, techniques, and application of the various forensic sciences.The past decade has seen an explosion of interest in the application of scientific techniques to investigations of crime. Television audiences have developed a seemingly insatiable appetite for shows such as CSI: Crime Scene...

Poser 7 Revealed: The efrontier Official Guide
Poser 7 Revealed: The efrontier Official Guide

Now you can conquer each essential feature of Poser 7! Poser 7 Revealed helps you develop the skills you need to create, render, and animate scenes and projects using the amazing tools offered by Poser 7. This hands-on guide provides you with step-by-step tutorials for each task, followed by projects that allow you to use each new skill on...

Early Breast Cancer: From Screening to Multidisciplinary Management, Second Edition
Early Breast Cancer: From Screening to Multidisciplinary Management, Second Edition

This book discusses the principles and practice of breast cancer management within the context of multidisciplinary team working and places emphasis on pragmatism. The text provides a comprehensive and contemporary account of the subject and should permit the reader to develop a firm understanding of the disease from epidemiology, genetics...

JUNOS Security
JUNOS Security

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...

Sparse and Redundant Representations: From Theory to Applications in Signal and Image Processing
Sparse and Redundant Representations: From Theory to Applications in Signal and Image Processing

This textbook introduces sparse and redundant representations with a focus on applications in signal and image processing. The theoretical and numerical foundations are tackled before the applications are discussed. Mathematical modeling for signal sources is discussed along with how to use the proper model for tasks such as denoising,...

Ultrashort Laser Pulse Phenomena, Second Edition
Ultrashort Laser Pulse Phenomena, Second Edition

Ultrashort Laser Pulse Phenomena serves as an introduction to the phenomena of ultrashort laser pulses and describes how this technology can be applied in areas such as spectroscopy, medical imaging, electromagnetism, optics, and quantum physics. Combining the principles with experimental techniques, the book serves as a guide to designing...

Managing Information Security
Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth...

Internet Lockdown: Internet Security Administrator's Handbook
Internet Lockdown: Internet Security Administrator's Handbook

Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand....

Microarray Image Analysis: An Algorithmic Approach
Microarray Image Analysis: An Algorithmic Approach

To harness the high-throughput potential of DNA microarray technology, it is crucial that the analysis stages of the process are decoupled from the requirements of operator assistance. Microarray Image Analysis: An Algorithmic Approach presents an automatic system for microarray image processing to make this...

Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy