Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing: An Evolutionary Approach for Neural Networks and Fuzzy Systems
Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing: An Evolutionary Approach for Neural Networks and Fuzzy Systems
We describe in this book, new methods for intelligent pattern recognition using soft computing techniques. Soft Computing (SC) consists of several computing paradigms, including fuzzy logic, neural networks, and genetic algorithms, which can be used to produce powerful hybrid intelligent systems for pattern recognition. Hybrid intelligent systems...
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart (2nd Edition)
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart (2nd Edition)

Many years ago, when I had to learn C overnight to make a living as a programmer (this was before C++), I would have given half my salary to find a mentor, a person would say, “Here are the potholes in the road...errors that you are sure to make in learning C. And here’s how to steer around them.” Instead, I had to...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Global Marketing Management
Global Marketing Management

Global Marketing Management prepares students to become effective managers overseeing global marketing activities in an increasingly competitive environment.  The text’s guiding principle, as laid out clearly and methodically by authors Kotabe and Helsen, is that the realities of international marketing are more...

Computer-Based Analysis of the Stochastic Stability of Mechanical Structures Driven by White and Colored Noise (SpringerBriefs in Applied Sciences and Technology)
Computer-Based Analysis of the Stochastic Stability of Mechanical Structures Driven by White and Colored Noise (SpringerBriefs in Applied Sciences and Technology)

This book provides a concise introduction to the behavior of mechanical structures and testing their stochastic stability under the influence of noise. It explains the physical effects of noise and in particular the concept of Gaussian white noise. In closing, the book explains how to model the effects of noise on mechanical...

Quality of Telephone-Based Spoken Dialogue Systems
Quality of Telephone-Based Spoken Dialogue Systems
An increasing number of telephone services are offered in a fully automatic way with the help of speech technology. The underlying systems, called spoken dialogue systems (SDSs), possess speech recognition, speech understanding, dialogue management, and speech generation capabilities, and enable a more-or-less natural spoken interaction with the...
Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

New Perspectives on Microsoft Excel 2010: Brief (New Perspectives)
New Perspectives on Microsoft Excel 2010: Brief (New Perspectives)

The New Perspectives Series’ critical-thinking, problem-solving approach is the ideal way to prepare students to transcend point-and-click skills and take advantage of all that Microsoft Office 2010 has to offer.

In developing the New Perspectives Series, our goal was to create books that give students the software...

3ds Max 2012 Bible
3ds Max 2012 Bible
Every time I enter the computer room (which my wife calls the dungeon), my wife still says that I am off to my “fun and games.” I, as always, flatly deny this accusation, saying that it is serious work that I am involved in. But later, when I emerge with a twinkle in my eye and excitedly ask her to take a look at my...
Artificial Companion for Second Language Conversation: Chatbots Support Practice Using Conversation Analysis
Artificial Companion for Second Language Conversation: Chatbots Support Practice Using Conversation Analysis

The research described in this book shows that conversation analysis can effectively model dialogue. Specifically, this work shows that the multidisciplinary field of communicative ICALL may greatly benefit from including Conversation Analysis. As a consequence, this research makes several contributions to the related research...

Turbulence And Coherent Structures in Fluids, Plasmas And Nonlinear Medium (World Scientific Lecture Notes in Complex Systems)
Turbulence And Coherent Structures in Fluids, Plasmas And Nonlinear Medium (World Scientific Lecture Notes in Complex Systems)
The problem of turbulence and coherent structures is of key importance in many fields of science and engineering. It is an area which is vigorously researched across a diverse range of disciplines such as theoretical physics, oceanography, atmospheric science, magnetically confined plasma, nonlinear optics, etc. Modern studies...
unlimited object storage image
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy