Home | Amazing | Today | Tags | Publishers | Years | Search 
Temporal Data Mining (Chapman & Hall/CRC Data Mining and Knowledge Discovery)
Temporal Data Mining (Chapman & Hall/CRC Data Mining and Knowledge Discovery)

Temporal data mining deals with the harvesting of useful information from temporal data. New initiatives in health care and business organizations have increased the importance of temporal information in data today.

From basic data mining concepts to state-of-the-art advances, Temporal Data Mining covers...

Statistics for Censored Environmental Data Using Minitab and R
Statistics for Censored Environmental Data Using Minitab and R

Praise for the First Edition

" . . . an excellent addition to an upper-level undergraduate course on environmental statistics, and . . . a 'must-have' desk reference for environmental practitioners dealing with censored datasets."
—Vadose Zone Journal

Statistical Methods for...

Applied Statistical Genetics with R: For Population-based Association Studies (Use R!)
Applied Statistical Genetics with R: For Population-based Association Studies (Use R!)

Statistical genetics has become a core course in many graduate programs in public health and medicine. This book presents fundamental concepts and principles in this emerging field at a level that is accessible to students and researchers with a first course in biostatistics. Extensive examples are provided using publicly available data and...

Work (The Art of Living Series)
Work (The Art of Living Series)

Work is one of the most universal features of human life; virtually everybody spends some part of their life at work. It is often associated with tedium and boredom; in conflict with the things we would otherwise love to do. Thinking of work primarily as a burden - an activity we would rather be without - is a thought that was shared by the...

Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

The New Rules of Green Marketing: Strategies, Tools, and Inspiration for Sustainable Branding
The New Rules of Green Marketing: Strategies, Tools, and Inspiration for Sustainable Branding

Green products have been around since the 1970s, but it's only in recent years that they've become ubiquitous. That's because savvy green marketers are no longer targeting "deep green" consumers with a "save the planet" pitch. Instead, they're promoting the added value their products provide: better health,...

Yogurt Every Day: Healthy and Delicious Recipes for Breakfast, Lunch, Dinner and Dessert
Yogurt Every Day: Healthy and Delicious Recipes for Breakfast, Lunch, Dinner and Dessert

Hailed as a superfood and loved for its cool, tangy taste, yogurt's popularity continues to grow. Yogurt Every Day feeds this frenzy for yogurt, serving up 75 delicious recipes for breakfast, lunch, dinner, snacks and dessert, including how to make your own yogurt at home.


After years of
...

Bioinformatics and Computational Biology Solutions Using R and Bioconductor (Statistics for Biology and Health)
Bioinformatics and Computational Biology Solutions Using R and Bioconductor (Statistics for Biology and Health)

Full four-color book.

Some of the editors created the Bioconductor project and Robert Gentleman is one of the two originators of R.

All methods are illustrated with publicly available data, and a major section of the book is devoted to fully worked case studies.

Code underlying all of the computations that are...

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Harmony Search Algorithm: Proceedings of the 3rd International Conference on Harmony Search Algorithm (ICHSA 2017) (Advances in Intelligent Systems and Computing)
Harmony Search Algorithm: Proceedings of the 3rd International Conference on Harmony Search Algorithm (ICHSA 2017) (Advances in Intelligent Systems and Computing)

This book presents state-of-the-art technical contributions based around one of the most successful evolutionary optimization algorithms published to date: Harmony Search. Contributions span from novel technical derivations of this algorithm to applications in the broad fields of civil engineering, energy, transportation &...

Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)

This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego,...

Arguing with Zombies: Economics, Politics, and the Fight for a Better Future
Arguing with Zombies: Economics, Politics, and the Fight for a Better Future

An accessible, compelling introduction to today’s major policy issues from the New York Times columnist, best-selling author, and Nobel prize–winning economist Paul Krugman.

There is no better guide than Paul Krugman to basic economics, the ideas that animate much of our public...

Result Page: 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy