Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer-Aided Intelligent Recognition Techniques and Applications
Computer-Aided Intelligent Recognition Techniques and Applications
Intelligent recognition methods have recently proven to be indispensable in a variety of modern industries, including computer vision, robotics, medical imaging, visualization and the media. Furthermore, they play a critical role in the traditional fields such as character recognition, natural language processing and personal identification.

...

Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
Grant's Atlas of Anatomy, 12th Edition
Grant's Atlas of Anatomy, 12th Edition

A cornerstone of gross anatomy since 1943, Grant's Atlas of Anatomy continues to reach students worldwide with its realistic illustrations, detailed surface anatomy photos, clinical relevance, and muscle tables.

Renowned for its accuracy, pedagogy, and clinical relevance, the new edition of this classic...

Applied Genetic Programming and Machine Learning
Applied Genetic Programming and Machine Learning

This book delivers theoretical and practical knowledge on extension of Genetic Programming (GP) for practical applications. It provides a methodology for  integrating Genetic Programming and machine-learning techniques. The developmentof such tools contributes to the establishment of a more robust evolutionary framework when addressing...

MATLAB Machine Learning
MATLAB Machine Learning
This book is a comprehensive guide to machine learning with worked examples in MATLAB. It starts with an overview of the history of Artificial Intelligence and automatic control and how the field of machine learning grew from these. It provides descriptions of all major areas in machine learning.

The book reviews
...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication

This is the third revised edition of the established and trusted RFID Handbook; the most comprehensive introduction to radio frequency identification (RFID) available.

This essential new edition contains information on electronic product code (EPC) and the EPC global network, and explains near-field communication (NFC) in...

Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management...

Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

DNA Damage Recognition
DNA Damage Recognition

Stands as the most comprehensive guide to the subject―covering every essential topic related to DNA damage identification and repair.

Covering a wide array of topics from bacteria to human cells, this book summarizes recent developments in DNA damage repair and recognition while providing timely reviews on the molecular...

The Doctor in the Victorian Novel
The Doctor in the Victorian Novel

With the character of the doctor as her subject, Tabitha Sparks follows the decline of the marriage plot in the Victorian novel. As Victorians came to terms with the scientific revolution in medicine of the mid-to-late nineteenth century, the novel's progressive distance from the conventions of the marriage plot can be indexed through a rising...

Cluster Analysis for Data Mining and System Identification
Cluster Analysis for Data Mining and System Identification

Data clustering is a common technique for statistical data analysis, which is used in many fields, including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Clustering is the classification of similar objects into different groups, or more precisely, the partitioning of a data set into subsets...

Result Page: 35 34 33 32 31 30 29 28 27 26 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy