Home | Amazing | Today | Tags | Publishers | Years | Search 
Robot Building for Beginners (Technology in Action)
Robot Building for Beginners (Technology in Action)

This book continues its aim at teenagers and adults who have an avid interest in science and dream of building household explorers. No formal engineering education is assumed.

The robot described and built in this book is battery powered and about the size of a lunchbox. It is autonomous. That is, it isn’t remote...

Fault Location on Power Networks (Power Systems)
Fault Location on Power Networks (Power Systems)

Electric power systems will always be exposed to the failure of their components. When a fault occurs on a line, it is crucial for the fault location to be identified as accurately as possible, allowing the damage caused by the fault to be repaired quickly before the line is put back into service. Fault Location on Power Lines enables...

Distributed Intelligent Systems: A Coordination Perspective
Distributed Intelligent Systems: A Coordination Perspective

Distributed Intelligent Systems: A Coordination Perspective addresses and comprehensively answers commonly asked questions about coordination in agent-oriented distributed systems. Characterizing the state-of-the-art research in the field of coordination with regard to the development of distributed agent-oriented systems is a particularly...

High-Level Data Fusion
High-Level Data Fusion
Master cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and...
SQL Server MVP Deep Dives
SQL Server MVP Deep Dives

This is not an ordinary SQL Server Book. SQL Server MVP Deep Dives brings together the world's most highly-regarded SQL Server experts to create a masterful collection of tips, techniques, and experience-driven best practices for SQL Server development and administration. These SQL Server MVPs-53 in all-each selected a topic of...

Information Processing and Security Systems
Information Processing and Security Systems

Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in...

Rough  Granular Computing in Knowledge Discovery and Data Mining (Studies in Computational Intelligence)
Rough Granular Computing in Knowledge Discovery and Data Mining (Studies in Computational Intelligence)

The book "Rough-Granular Computing in Knowledge Discovery and Data Mining" written by Professor Jaroslaw Stepaniuk is dedicated to methods based on a combination of the following three closely related and rapidly growing areas: granular computing, rough sets, and knowledge discovery and data mining (KDD). In the book, the KDD...

Foundations of Knowledge Acquisition:: Machine Learning (The International Series in Engineering and Computer Science)
Foundations of Knowledge Acquisition:: Machine Learning (The International Series in Engineering and Computer Science)
The two volumes of Foundations of Knowledge Acquisition document the recent progress of basic research in knowledge acquisition sponsored by the Office of Naval Research. This volume is subtitled Machine Learning, and there is a companion volume subtitled Cognitive Models of Complex Learning. Funding was provided by a five-year Accelerated...
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld

During his campaign for reelection in 1996, the Internet-savvy President Bill Clinton used the slogan “Building a Bridge to the 21st Century.” It turns out that the bridge is operated and maintained in cyber form, and that malevolent actors can practice their black arts to disrupt or destroy the bridge, its cyber traffic, and all...

Inductive Inference for Large Scale Text Classification: Kernel Approaches and Techniques (Studies in Computational Intelligence)
Inductive Inference for Large Scale Text Classification: Kernel Approaches and Techniques (Studies in Computational Intelligence)

Text classification is becoming a crucial task to analysts in different areas. In the last few decades, the production of textual documents in digital form has increased exponentially. Their applications range from web pages to scientific documents, including emails, news and books. Despite the widespread use of digital texts, handling them is...

Data Mining: Special Issue in Annals of Information Systems
Data Mining: Special Issue in Annals of Information Systems

Over the course of the last twenty years, research in data mining has seen a substantial increase in interest, attracting original contributions from various disciplines including computer science, statistics, operations research, and information systems. Data mining supports a wide range of applications, from medical decision making,...

Applied Oracle Security: Developing Secure Database and Middleware Environments
Applied Oracle Security: Developing Secure Database and Middleware Environments

Cutting-edge techniques from leading Oracle security experts

This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database...

Result Page: 149 148 147 146 145 144 143 142 141 140 139 138 137 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy