Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Data-mining has become a popular research topic in recent years for the treatment of the "data rich and information poor" syndrome. Currently, application oriented engineers are only concerned with their immediate problems, which results in an ad hoc method of problem solving. Researchers, on the other hand, lack an understanding of the...
Genetic Fuzzy Systems
Genetic Fuzzy Systems

In recent years, a great number of publications have explored the use of genetic algorithms as a tool for designing fuzzy systems. Genetic Fuzzy Systems explores and discusses this symbiosis of evolutionary computation and fuzzy logic. The book summarizes and analyzes the novel field of genetic fuzzy systems, paying special attention to...

Swarm Intelligent Systems (Studies in Computational Intelligence)
Swarm Intelligent Systems (Studies in Computational Intelligence)
This volume offers a wide spectrum of sample works developed in leading research throughout the world about innovative methodologies of swarm intelligence and foundations of engineering swarm intelligent systems as well as applications and interesting experiences using the particle swarm optimisation. Swarm intelligence is an innovative...
Foundations of Python Network Programming
Foundations of Python Network Programming

Foundations of Python Network Programming, Third Edition, covers all of the classic topics found in the second edition of this book, including network protocols, network data and errors, email, server architecture, and HTTP and web applications, plus updates for Python 3.

Some of the new topics in this edition...

Principles of Embedded Networked Systems Design
Principles of Embedded Networked Systems Design
"...this volume represents a real mine of information...anyone working in the field would benefit from owning a copy." IEEE Communications Engineer

Embedded network systems (ENS) provide a set of technologies that can link the physical world to large-scale networks in applications, such as monitoring of borders,
...
Introduction to Cryptography
Introduction to Cryptography

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on...

Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms
Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms

With the reinvigoration of neural networks in the 2000s, deep learning has become an extremely active area of research, one that’s paving the way for modern machine learning. In this practical book, author Nikhil Buduma provides examples and clear explanations to guide you through major concepts of this complicated field.

...
Secure Systems Development with UML
Secure Systems Development with UML
Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness.

Jürjens presents the UML extension UMLsec for secure systems development. It uses the standard UML...

Computability and Complexity: From a Programming Perspective (Foundations of Computing)
Computability and Complexity: From a Programming Perspective (Foundations of Computing)
Computability and complexity theory should be of central concern to practitioners as well as theorists. Unfortunately, however, the field is known for its impenetrability. Neil Jones's goal as an educator and author is to build a bridge between computability and complexity theory and other areas of computer science, especially programming. In a...
IPv6 in Practice: A Unixer's Guide to the Next Generation Internet
IPv6 in Practice: A Unixer's Guide to the Next Generation Internet

Handling IPv6 for the first time is a challenging task even for the experienced system administrator. New concepts and mechanisms make it necessary to rethink well-established methods of the IPv4 protocol.

This book is a practical guide to IPv6 addressing Unix and network administrators with experience in TCP/IP(v4) but not necessarily...

How to Plan, Contract and Build Your Own Home
How to Plan, Contract and Build Your Own Home
The Classic Blueprint for Do-It-Yourself Homebuilders Updated to Reflect the Latest Materials, Techniques, and Options!

Covering everything from hiring the right vendors to choosing fixtures, this information-packed guide is a step-by-step roadmap for building a new home or remodeling an existing one. The heavily-revised Fourth Edition...

Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
The vast expansion and rigorous treatment of cryptography is one of the major achievements of theoretical computer science. In particular, concepts such as computational indistinguishability, pseudorandomness and zero-knowledge interactive proofs were introduced, classical notions such as secure encryption and unforgeable signatures were placed on...
unlimited object storage image
Result Page: 76 75 74 73 72 71 70 69 68 67 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy