Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
GARCH Models: Structure, Statistical Inference and Financial Applications
GARCH Models: Structure, Statistical Inference and Financial Applications

Provides a comprehensive and updated study of GARCH models and their applications in finance, covering new developments in the discipline

This book provides a comprehensive and systematic approach to understanding GARCH time series models and their applications whilst presenting the most advanced results...

Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018.

The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following
...
System Parameter Identification: Information Criteria and Algorithms (Elsevier Insights)
System Parameter Identification: Information Criteria and Algorithms (Elsevier Insights)

Recently, criterion functions based on information theoretic measures (entropy, mutual information, information divergence) have attracted attention and become an emerging area of study in signal processing and system identification domain. This book presents a systematic framework for system identification and information processing,...

System Reengineering in Healthcare: Application for Hospital Emergency Departments (Studies in Systems, Decision and Control)
System Reengineering in Healthcare: Application for Hospital Emergency Departments (Studies in Systems, Decision and Control)

This book presents an advanced systematic mapping review (SMR) and state-of-the-art taxonomy of emergency departments (EDs). Focusing on the patients’ level of fulfilment and how it can be enhanced, it examines existing problems like waiting periods and overcrowding and how these can be alleviated to provide a better service....

Foundations of Robotics: Analysis and Control
Foundations of Robotics: Analysis and Control

Foundations of Robotics presents the fundamental concepts and methodologies for the analysis, design, and control of robot manipulators. It explains the physical meaning of the concepts and equations used, and it provides, in an intuitively clear way, the necessary background in kinetics, linear algebra, and control theory....

Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras
Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras

Deep learning simplified by taking supervised, unsupervised, and reinforcement learning to the next level using the Python ecosystem

Key Features

  • Build deep learning models with transfer learning principles in Python
  • implement transfer learning to solve real-world research...
Robot Vision: Strategies, Algorithms and Motion Planning
Robot Vision: Strategies, Algorithms and Motion Planning

The field of robot vision guidance is developing rapidly. The benefits of sophisticated vision technology include savings, improved quality, reliability, safety and productivity. Robot vision is used for part identification and navigation. Vision applications generally deal with finding a part and orienting it for robotic handling or...

RFID Applied
RFID Applied
Everything you need to know to implement and fully leverage RFID technology

RFID Applied is just that—the application of radio-frequency identification (RFID) technology. The book discusses both the technical and the business issues involved in selecting, developing, and implementing an RFID system.

...
DNA Damage Recognition
DNA Damage Recognition

Stands as the most comprehensive guide to the subject―covering every essential topic related to DNA damage identification and repair.

Covering a wide array of topics from bacteria to human cells, this book summarizes recent developments in DNA damage repair and recognition while providing timely reviews on the molecular...

The Doctor in the Victorian Novel
The Doctor in the Victorian Novel

With the character of the doctor as her subject, Tabitha Sparks follows the decline of the marriage plot in the Victorian novel. As Victorians came to terms with the scientific revolution in medicine of the mid-to-late nineteenth century, the novel's progressive distance from the conventions of the marriage plot can be indexed through a rising...

Cluster Analysis for Data Mining and System Identification
Cluster Analysis for Data Mining and System Identification

Data clustering is a common technique for statistical data analysis, which is used in many fields, including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Clustering is the classification of similar objects into different groups, or more precisely, the partitioning of a data set into subsets...

Result Page: 35 34 33 32 31 30 29 28 27 26 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy