Home | Amazing | Today | Tags | Publishers | Years | Search 
Hybrid Methods in Pattern Recognition
Hybrid Methods in Pattern Recognition
The discipline of pattern recognition has seen enormous progress since its beginnings more than four decades ago. Over the years various approaches have emerged, based on statistical decision theory, structural matching and parsing, neural networks, fuzzy logic, artificial intelligence, evolutionary computing, and others. Obviously, these...
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
The idea for this book came out of a need to find a text for a unit in Information Warfare given to Doctor of Business Administration students. Most of the existing texts had a military flavour and so did not suit our task. Others concentrated on security aspects and assumed some level of knowledge in this area. What we wanted was a text that...
Linkage in Evolutionary Computation (Studies in Computational Intelligence)
Linkage in Evolutionary Computation (Studies in Computational Intelligence)
In recent years, the issue of linkage in GEAs has garnered greater attention and recognition from researchers. Conventional approaches that rely much on ad hoc tweaking of parameters to control the search by balancing the level of exploitation and exploration are grossly inadequate. As shown in the work reported here, such parameters tweaking based...
Bio-inspired Algorithms for the Vehicle Routing Problem (Studies in Computational Intelligence)
Bio-inspired Algorithms for the Vehicle Routing Problem (Studies in Computational Intelligence)
The vehicle routing problem (VRP) is one of the most famous combinatorial optimization problems. In simple terms, the goal is to determine a set of routes with overall minimum cost that can satisfy several geographical scattered demands. Biological inspired computation is a field devoted to the development of computational tools modeled after...
Going Wireless: Transform Your Business with Mobile Technology
Going Wireless: Transform Your Business with Mobile Technology
Going Wireless delivers the unexpected by showing how wireless is transforming every type of enterprise from micro-businesses to multi-national conglomerates.

Award-winning technology journalist Jaclyn Easton begins with an in-depth look at owning your customers and clients through mobile commerce -- whether your company focuses on...

Immunological Computation: Theory and Applications
Immunological Computation: Theory and Applications
Over the last decade, the field of immunological computation has progressed slowly and steadily as a branch of computational intelligence. Immunological Computation: Theory and Applications presents up-to-date immunity-based computational techniques. After a brief review of fundamental immunology concepts, the book presents computational models...
Data Mining for Business Applications
Data Mining for Business Applications
Data Mining for Business Applications presents the state-of-the-art research and development outcomes on methodologies, techniques, approaches and successful applications in the area. The contributions mark a paradigm shift from “data-centered pattern mining” to “domain driven actionable knowledge discovery”...
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications provides a comprehensive overview of terrorism, public and private sector counterterrorism, and "all hazards" emergency management. The book presents national, state, and local perspectives and up-to-date information, including the reorganization of the...
Information Flow and Knowledge Sharing, Volume 2 (Capturing Intelligence)
Information Flow and Knowledge Sharing, Volume 2 (Capturing Intelligence)
Our goal in this book is to present our conceptualization of information and of knowledge, and to clarify the distinctions between these two concepts. Indeed, they are more than concepts. These two words convey a plurality of meanings and have a deep character that goes beyond pure conceptualizations. By emphasizing their distinctions, we do not...
SolidWorks 2007 Bible
SolidWorks 2007 Bible
"The most complete resource for SolidWorks on the market. Matt Lombard's in-depth knowledge plus his snappy wit and wisdom make SolidWorks accessible to users at all levels."

— Mike Sabocheck, Territory Technical Manager, SolidWorks Corporation

The most comprehensive single reference on...

The Unofficial Guide to Windows Vista
The Unofficial Guide to Windows Vista
The inside scoop...for when you want more than the official line!

Microsoft Vista may be the hot new operating system, but to use it with confidence, you'll need to know its quirks and shortcuts. Find out what the manual doesn't always tell you in this insider's guide to using Vista in the real world. How can you customize...

Microsoft Office PerformancePoint Server 2007
Microsoft Office PerformancePoint Server 2007
Writing a book is hard. That’s why I write book Forewords. I do know that having passion is important to writing a good book. Passion carries you the distance, through the nights and weekends required to finish the book. Passion also drives the quality and depth of the book. Your authors have passion to spare. You’ll see this and feel...
Result Page: 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy