Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Machine Learning (Adaptive Computation and Machine Learning)
Introduction to Machine Learning (Adaptive Computation and Machine Learning)
The goal of machine learning is to program computers to use example data or past experience to solve a given problem. Many successful applications of machine learning exist already, including systems that analyze past sales data to predict customer behavior, recognize faces or spoken speech, optimize robot behavior so that a task can be completed...
Practical Industrial Data Communications: Best Practice Techniques
Practical Industrial Data Communications: Best Practice Techniques
The objective of this book is to outline the best practice in designing, installing, commissioning and troubleshooting industrial data communications systems. In any given plant, factory or installation there are a myriad of different industrial communications standards used and the key to successful implementation is the degree to which the entire...
Fuzzy Systems Engineering: Toward Human-Centric Computing
Fuzzy Systems Engineering: Toward Human-Centric Computing
A self-contained treatment of fuzzy systems engineering, offering conceptual fundamentals, design methodologies, development guidelines, and carefully selected illustrative material

Forty years have passed since the birth of fuzzy sets, in which time a wealth of theoretical developments, conceptual pursuits, algorithmic...

Electronic Commerce: Fundamentals & Applications
Electronic Commerce: Fundamentals & Applications
A comprehensive introduction to the underlying technologies of e-commerce. This book explores the full range of technologies, protocols, and techniques necessary for building successful e-commerce sites. The authors begin with an overview of the Internet and the Web, then quickly move on to explain server-side programming techniques, cryptography...
Database and Data Communication Network Systems, Three-Volume Set: Techniques and Applications
Database and Data Communication Network Systems, Three-Volume Set: Techniques and Applications
Database and Data Communication Network Systems examines the utilization of the Internet and Local Area/Wide Area Networks in all areas of human endeavor. This three-volume set covers, among other topics, database systems, data compression, database architecture, data acquisition, asynchronous transfer mode (ATM) and the practical...
Introduction to Information Retrieval
Introduction to Information Retrieval
Class-tested and coherent, this groundbreaking new textbook teaches web-era information retrieval, including web search and the related areas of text classification and text clustering from basic concepts. Written from a computer science perspective by three leading experts in the field, it gives an up-to-date treatment of all aspects of the design...
Excel 2003 Power Programming with VBA
Excel 2003 Power Programming with VBA

"Today, no accomplished Excel programmer can afford to be without John’s book. The value of Excel 2003 Power Programming with VBA is double most other books--simultaneously the premier reference and best learning tool for Excel VBA."
—Loren Abdulezer, Author of Excel Best Practices for Business

Everything...

Artificial Intelligence: A Systems Approach (w/CDROM)(Computer Science) (Engineering)
Artificial Intelligence: A Systems Approach (w/CDROM)(Computer Science) (Engineering)
The history of AI is interesting all by itself. It’s a modern-day drama, filled with excitement and anticipation, discovery, and disappointment. From over-promises of early (and later) AI research, to fears of the unknown from the general public, AI’s history is worthy of study by itself. In this chapter, we’ll explore AI’s...
The Conspirators Hierarchy: The Committee of Three Hundred
The Conspirators Hierarchy: The Committee of Three Hundred
Can you imagine an all powerful group, that knows no national boundaries, above the laws of all countries, one that controls every aspect of politics, religion, commerce and industry; banking, insurance, mining, the drug trade, the petroleum industry, a group answerable to no one but its members. To the vast majority of us, such a group would...
C++ by Example: UnderC Learning Edition
C++ by Example: UnderC Learning Edition
C++ by Example includes 'UnderC,' an open-source language interpreter developed by the author, which shows the result of each new programming technique instantly, allowing novices to experiment in a more dynamic learning environment. The book starts with the fundamentals of the language, including expressions, variables, functions, and...
New Challenges in Applied Intelligence Technologies (Studies in Computational Intelligence)
New Challenges in Applied Intelligence Technologies (Studies in Computational Intelligence)
The field of intelligence technologies covers a variety of computational approaches that are often suggested and inspired by biological systems, exhibiting functional richness and flexibility of natural behavior. This class of technologies consists of such important approaches as data mining algorithms, neural networks, genetic algorithms, fuzzy...
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
The book is organized in four major areas. The first unit focuses on the terrorism informatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The fourth unit presents surveillance and emergency response.

Readers will find the book...

Result Page: 62 61 60 59 58 57 56 55 54 53 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy