Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Complex Datasets: Data Mining with Matrix Decompositions
Understanding Complex Datasets: Data Mining with Matrix Decompositions
Many data-mining algorithms were developed for the world of business, for example for customer relationship management. The datasets in this environment, although large, are simple in the sense that a customer either did or did not buy three widgets, or did or did not fly from Chicago to Albuquerque.

In contrast,
...
Security for Multihop Wireless Networks
Security for Multihop Wireless Networks

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area...

OpenCV By Example
OpenCV By Example

Enhance your understanding of Computer Vision and image processing by developing real-world projects in OpenCV 3

About This Book

  • Get to grips with the basics of Computer Vision and image processing
  • This is a step-by-step guide to developing several real-world Computer Vision projects...
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Sparse and Redundant Representations: From Theory to Applications in Signal and Image Processing
Sparse and Redundant Representations: From Theory to Applications in Signal and Image Processing

This textbook introduces sparse and redundant representations with a focus on applications in signal and image processing. The theoretical and numerical foundations are tackled before the applications are discussed. Mathematical modeling for signal sources is discussed along with how to use the proper model for tasks such as denoising,...

Fault Analysis in Cryptography (Information Security and Cryptography)
Fault Analysis in Cryptography (Information Security and Cryptography)

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic...

Cancer Immunotherapy at the Crossroads: How Tumors Evade Immunity and What Can Be Done (Current Clinical Oncology)
Cancer Immunotherapy at the Crossroads: How Tumors Evade Immunity and What Can Be Done (Current Clinical Oncology)

Leading investigators and clinicians detail the different mechanisms used by tumors to escape and impair the immune system and then spell out possible clinical strategies to prevent or reverse tumor-induced immune dysfunction. The authors review the mechanisms of immune dysfunction and evasion mechanisms in histologically diverse human...

Preimplantation Genetic Diagnosis
Preimplantation Genetic Diagnosis

Preimplantation genetic diagnosis (PGD) is a key technique in modern reproductive medicine. Originally developed to help couples who were at risk of transmitting single-gene genetic abnormalities to their children, the development of the FISH technique broadened chromosome analysis to include detection of more complex inherited abnormalities....

Metastasis of Breast Cancer (Cancer Metastasis - Biology and Treatment)
Metastasis of Breast Cancer (Cancer Metastasis - Biology and Treatment)

Written by experts in the subject area, the book covers a broad range of topics in the metastasis of breast cancer, from genetics, biology to clinical management. Main topics include genetic control, biology, growth factors, cell adhesion, cell motility and invasion, natures of bone metastasis, sentinel node therapies, hormonal links, new...

Switching to Angular 2
Switching to Angular 2

Key Features

  • Get up to date with the latest changes to Angular 2, including the improvements to directives, change detection, dependency injection, router, and more
  • Understand Angular 2's new component-based architecture
  • Start using TypeScript to supercharge your Angular 2...
Algorithms in Combinatorial Design Theory (Mathematics Studies)
Algorithms in Combinatorial Design Theory (Mathematics Studies)
Recent years have seen an explosive growth in research in combinatorics and graph theory. One primary factor in this rapid development has been the advent of computers, and the parallel study of practical and efficient algorithms. This volume represents an attempt to...
Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
unlimited object storage image
Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy