Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The BASICS Lean Implementation Model
The BASICS Lean Implementation Model

In 2004 Charlie Protzman created The BASICS Lean Implementation Model, which covers the full spectrum of what is needed to be effective and successful at implementing a Lean System. The reader is taken through a step by step approach developed over the last 15 years, in the use and understanding of Lean tools, principles, and...

Fundamentals of Probability: With Stochastic Processes
Fundamentals of Probability: With Stochastic Processes

"The 4th edition of Ghahramani's book is replete with intriguing historical notes, insightful comments, and well-selected examples/exercises that, together, capture much of the essence of probability. Along with its Companion Website, the book is suitable as a primary resource for a first course in probability. Moreover, it...

Topographical Tools for Filtering and Segmentation 1: Watersheds on Node- or Edge-weighted Graphs (Digital Signal and Image Processing)
Topographical Tools for Filtering and Segmentation 1: Watersheds on Node- or Edge-weighted Graphs (Digital Signal and Image Processing)

Mathematical morphology has developed a powerful methodology for segmenting images, based on connected filters and watersheds. We have chosen the abstract framework of node- or edge-weighted graphs for an extensive mathematical and algorithmic description of these tools.

Volume 1 is devoted to watersheds. The
...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Collaborative Geographic Information Systems
Collaborative Geographic Information Systems
Many advances in the integration of group spatial modeling, geographic information systems (GIS), and the Internet have occurred in recent years; however, there is a lack of materials to highlight the transdisciplinary characteristics and impacts of this convergence while providing a uniform and consistent treatment of this expanding field of...
Characterization of Minerals, Metals, and Materials 2019 (The Minerals, Metals & Materials Series)
Characterization of Minerals, Metals, and Materials 2019 (The Minerals, Metals & Materials Series)
The interrelationships among composition, structure, property, process, and per formance of a material is the fundamental for materials research, development, manufacturing, and application. Materials characterization is the key to reveal these relationships throughout the entire circulation process of materials, from...
Data Mining Methods and Models
Data Mining Methods and Models
Apply powerful Data Mining Methods and Models to Leverage your Data for Actionable Results

Data Mining Methods and Models provides:

  • The latest techniques for uncovering hidden nuggets of information
  • The insight into how the data mining algorithms actually work
  • The hands-on experience of...
Geoinformation: Remote Sensing, Photogrammetry and Geographic Information Systems, Second Edition
Geoinformation: Remote Sensing, Photogrammetry and Geographic Information Systems, Second Edition
Surveying and mapping has recently undergone a transition from discipline-oriented technologies, such as geodesy, surveying, photogrammetry and cartography, to the methodology-oriented integrated discipline of geoinformatics based on GPS positioning, remote sensing, digital photography for data acquisition, and GIS for data manipulation and data...
Spy the Lie: Former CIA Officers Teach You How to Detect Deception
Spy the Lie: Former CIA Officers Teach You How to Detect Deception

THE NEW YORK TIMES BESTSELLER

Three former CIA officers--among the world's foremost authorities on recognizing deceptive behavior--share their proven techniques for uncovering a lie

Imagine how different your life would be if you could tell whether someone was lying or telling you the truth.
...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Visual Data Mining: The VisMiner Approach
Visual Data Mining: The VisMiner Approach

A visual approach to data mining.

Data mining has been defined as the search for useful and previously unknown patterns in large datasets, yet when faced with the task of mining a large dataset, it is not always obvious where to start and how to proceed. 

This book introduces a visual methodology for data...

Hidden Markov Models for Time Series: An Introduction Using R (Chapman & Hall/CRC Monographs on Statistics & Applied Probability)
Hidden Markov Models for Time Series: An Introduction Using R (Chapman & Hall/CRC Monographs on Statistics & Applied Probability)

Reveals How HMMs Can Be Used as General-Purpose Time Series Models

Implements all methods in R
Hidden Markov Models for Time Series: An Introduction Using R applies hidden Markov models (HMMs) to a wide range of time series types, from continuous-valued, circular, and
...

Result Page: 84 83 82 81 80 79 78 77 76 75 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy