Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Soft Computing in Image Processing (Studies in Fuzziness and Soft Computing)
Soft Computing in Image Processing (Studies in Fuzziness and Soft Computing)

Images have always been very important in human life. Their applications range from primitive communication between humans of all ages to advanced technologies in the industrial, medical and military field. The increased possibilities to capture and analyze images have contributed to the largeness that the scientific field of image processing...

Themes of the American Civil War: The War Between the States
Themes of the American Civil War: The War Between the States

Themes of the American Civil War offers a timely and useful guide to this vast topic for a new generation of students. The volume provides a broad-ranging assessment of the causes, complexities, and consequences of America’s most destructive conflict to date. The essays, written by top scholars in the field, and reworked for this...

Reliable Knowledge Discovery
Reliable Knowledge Discovery
With the rapid development of the data mining and knowledge discovery, a key issue which could significantly affect the real world applications of data mining is the reliability issues of knowledge discovery. It is natural that people will ask if the discovered knowledge is reliable. Why do we trust the discovered knowledge? How...
The Archaeology of Athens
The Archaeology of Athens
The city of Athens has played a leading role in the development of European civilization. When we look back through time to the origins of so many of the institutions and activities which thrive or are valued today, we are led to ancient Greece and, most often, to Athens in the Classical period (480–323 B.C.). Time and again...
An Encyclopedia of Battles: Accounts of Over 1,560 Battles from 1479 B.C. to the Present
An Encyclopedia of Battles: Accounts of Over 1,560 Battles from 1479 B.C. to the Present
Essential details of every major battle on land and sea in recorded history, from the first battle of Megiddo in 1479 B.C. to the Grenada conflict in 1984. Included: strategic situations, roles played by political/military leaders, troop numbers and training, tactics and objectives, casualties and losses and military/political consequences. Index....
ROI of Software Process Improvement: Metrics for Project Managers and Software Engineers
ROI of Software Process Improvement: Metrics for Project Managers and Software Engineers

This book masterfully illuminates extremely simple, but overwhelmingly powerful metrics, models, and methods for designing professional business cases while the author demystifies esoteric concepts in ROI.


An indispensable addition to your...

Design of Experiments in Chemical Engineering: A Practical Guide
Design of Experiments in Chemical Engineering: A Practical Guide

While existing books related to DOE are focused either on process or mixture factors or analyze specific tools from DOE science, this text is structured both horizontally and vertically, covering the three most common objectives of any experimental research:

  • screening designs
  • mathematical modeling, and...
Ancient Engineers' Inventions: Precursors of the Present (History of Mechanism and Machine Science)
Ancient Engineers' Inventions: Precursors of the Present (History of Mechanism and Machine Science)
This book describes inventions and designs of ancient engineers that are the precursors of the present. The ages mainly range from 300 B.C. to 1600 A.D. with some exceptions from before and after this period.

As for the very ancient ones, the book describes inventions (documented by archaeological finds mainly from Pompei, Ercolano and Stabia)...

CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

Blitzkrieg: From the Ground Up
Blitzkrieg: From the Ground Up

An examination of the German Blitzkrieg operations from Poland to Operation Barbarossa, as experienced by junior commanders and enlisted men, exploring why they were so successful.

The successes of the German Blitzkrieg in 1939–41 were as surprising as they were swift. Allied
...

Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy