Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CompTIA A+ Exam Prep (Exams A+ Essentials, 220-602, 220-603, 220-604)
CompTIA A+ Exam Prep (Exams A+ Essentials, 220-602, 220-603, 220-604)
This book covers every skill measured by the latest A+ Exams including:
  • Understanding all essential PC terminology, concepts, internal components, and peripherals
  • Installing, upgrading, configuring, and optimizing PC components
  • Troubleshooting hardware and performing essential preventive maintenance
  • ...
Moments and Moment Invariants in Pattern Recognition
Moments and Moment Invariants in Pattern Recognition

Automatic object recognition has become an established discipline in image analysis. Moments and moment invariants play a very important role as features in invariant recognition. They were introduced to the pattern recognition community almost 50 years ago and the mathematical background they utilized is even older, originating from the...

Seismic Imaging and Inversion: Volume 1: Application of Linear Inverse Theory
Seismic Imaging and Inversion: Volume 1: Application of Linear Inverse Theory

Extracting information from seismic data requires knowledge of seismic wave propagation and reflection. The commonly used method involves solving linearly for a reflectivity at every point within the Earth, but this book follows an alternative approach which invokes inverse scattering theory. By developing the theory of seismic imaging from...

Pro Machine Learning Algorithms: A Hands-On Approach to Implementing Algorithms in Python and R
Pro Machine Learning Algorithms: A Hands-On Approach to Implementing Algorithms in Python and R
Bridge the gap between a high-level understanding of how an algorithm works and knowing the nuts and bolts to tune your models better. This book will give you the confidence and skills when developing all the major machine learning models. In Pro Machine Learning Algorithms, you will first develop the algorithm in Excel so...
Design and Analysis of High Efficiency Line Drivers for xDSL
Design and Analysis of High Efficiency Line Drivers for xDSL
Design and Analysis of High Efficiency Line Drivers for xDSL covers the most important building block of an xDSL (ADSL, VDSL, ...) system: the line driver. Traditional Class AB line drivers consume more than 70% of the total power budget of state-of-the-art ADSL modems. This book describes the main difficulties in designing line drivers for xDSL....
Parallel and Distributed Logic Programming: Towards the Design of a Framework for the Next Generation Database Machines
Parallel and Distributed Logic Programming: Towards the Design of a Framework for the Next Generation Database Machines
Foundation of logic historically dates back to the times of Aristotle, who pioneered the concept of truth/falsehood paradigm in reasoning. Mathematical logic of propositions and predicates, which are based on the classical models of Aristotle, underwent a dramatic evolution during the last 50 years for its increasing applications in automated...
Fundamentals of Analog Circuits (2nd Edition)
Fundamentals of Analog Circuits (2nd Edition)
Fundamentals of Analog Circuits, Second Edition, presents an introduction to discrete linear devices and circuits, followed by comprehensive coverage of operational amplifiers and other linear integrated circuits. This new edition has been expanded and improved to include up-to-date coverage of these topics in a format...
Next Generation IPTV Services and Technologies
Next Generation IPTV Services and Technologies
Detailed coverage of the underlying technologies required to build an end-to-end IPTV system

The television entertainment industry is currently experiencing a major transformation as broadband subscribers and improvements in compression techniques for digital video content continue to grow. This growth is fueling the demand for a new generation...

Introduction to Cryptography (Undergraduate Texts in Mathematics)
Introduction to Cryptography (Undergraduate Texts in Mathematics)

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Designing Data Visualizations: Representing Informational Relationships
Designing Data Visualizations: Representing Informational Relationships

Data visualization is an efficient and effective medium for communicating large amounts of information, but the design process can often seem like an unexplainable creative endeavor. This concise book aims to demystify the design process by showing you how to use a linear decision-making process to encode your information...

Optimization, Control, and Applications of Stochastic Systems: In Honor of Onésimo Hernández-Lerma (Systems & Control: Foundations & Applications)
Optimization, Control, and Applications of Stochastic Systems: In Honor of Onésimo Hernández-Lerma (Systems & Control: Foundations & Applications)

This volume provides a general overview of discrete- and continuous-time Markov control processes and stochastic games, along with a look at the range of applications of stochastic control and some of its recent theoretical developments. These topics include various aspects of dynamic programming, approximation...

Introduction to Probability with Statistical Applications
Introduction to Probability with Statistical Applications
This book provides a calculus-based introduction to probability and statistics. It contains enough material for two semesters but, with judicious selection, it can be used as a textbook for a one-semester course, either in probability and statistics or in probability alone.

Each section contains many examples and exercises and, in the
...
unlimited object storage image
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy