Home | Amazing | Today | Tags | Publishers | Years | Search 
Adaptive Image Processing: A Computational Intelligence Perspective, Second Edition
Adaptive Image Processing: A Computational Intelligence Perspective, Second Edition

Illustrating essential aspects of adaptive image processing from a computational intelligence viewpoint, the second edition of Adaptive Image Processing: A Computational Intelligence Perspective provides an authoritative and detailed account of computational intelligence (CI) methods and algorithms for adaptive image...

Text Mining: Applications and Theory
Text Mining: Applications and Theory

Text Mining: Applications and Theory presents the state-of-the-art algorithms for text mining from both the academic and industrial perspectives.  The contributors span several countries and scientific domains: universities, industrial corporations, and government laboratories, and demonstrate the use of techniques from machine...

Advanced 3D Game Programming with DirectX 10.0 (Wordware Game and Graphics Library)
Advanced 3D Game Programming with DirectX 10.0 (Wordware Game and Graphics Library)

Advanced 3D Game Programming with DirectX 10.0 provides a guide to developing cutting-edge games using DirectX 10.0. Beginning with the foundations of 3D math and the components of DirectX, programmers new to graphics and game programming will learn how to implement networking, collision detection, and multithreading. Full source code is...

Cross Platform Game Development: Make PC Games for Windows, Linux and Mac
Cross Platform Game Development: Make PC Games for Windows, Linux and Mac

With the increasing popularity of games that run on all PC platforms whether Windows, Mac, or Linux the search is on for game developers who can create cross-platform games. Cross-Platform Game Development explains to both beginners and experts how to use cross-platform tools, provides tutorials on setting up and compiling key gaming...

Early Breast Cancer: From Screening to Multidisciplinary Management, Second Edition
Early Breast Cancer: From Screening to Multidisciplinary Management, Second Edition

This book discusses the principles and practice of breast cancer management within the context of multidisciplinary team working and places emphasis on pragmatism. The text provides a comprehensive and contemporary account of the subject and should permit the reader to develop a firm understanding of the disease from epidemiology, genetics...

Internet Lockdown: Internet Security Administrator's Handbook
Internet Lockdown: Internet Security Administrator's Handbook

Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand....

Managing Information Security
Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth...

Ultrashort Laser Pulse Phenomena, Second Edition
Ultrashort Laser Pulse Phenomena, Second Edition

Ultrashort Laser Pulse Phenomena serves as an introduction to the phenomena of ultrashort laser pulses and describes how this technology can be applied in areas such as spectroscopy, medical imaging, electromagnetism, optics, and quantum physics. Combining the principles with experimental techniques, the book serves as a guide to designing...

Sparse and Redundant Representations: From Theory to Applications in Signal and Image Processing
Sparse and Redundant Representations: From Theory to Applications in Signal and Image Processing

This textbook introduces sparse and redundant representations with a focus on applications in signal and image processing. The theoretical and numerical foundations are tackled before the applications are discussed. Mathematical modeling for signal sources is discussed along with how to use the proper model for tasks such as denoising,...

JUNOS Security
JUNOS Security

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...

Computational Fluid Dynamics in Practice
Computational Fluid Dynamics in Practice

Computational Fluid Dynamics in Practice explores the current and future developments in CFD, with the authors detailing advanced applications and case studies to demonstrate successes, illustrate the limitations, and identify methods for good practice. Designers, engineers, and researchers working in this field of fluid mechanics will...

Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions
Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions

Ensemble methods have been called the most influential development in Data Mining and Machine Learning in the past decade. They combine multiple models into one usually more accurate than the best of its components. Ensembles can provide a critical boost to industrial challenges -- from investment timing to drug discovery, and fraud detection...

Result Page: 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy