Home | Amazing | Today | Tags | Publishers | Years | Search 
Massively Parallel Evolutionary Computation on GPGPUs (Natural Computing Series)
Massively Parallel Evolutionary Computation on GPGPUs (Natural Computing Series)

Evolutionary algorithms (EAs) are metaheuristics that learn from natural collective behavior and are applied to solve optimization problems in domains such as scheduling, engineering, bioinformatics, and finance. Such applications demand acceptable solutions with high-speed execution using finite computational resources. Therefore, there have...

Artificial Intelligence Applications for Improved Software Engineering Development: New Prospects
Artificial Intelligence Applications for Improved Software Engineering Development: New Prospects

Despite decades of research, developing software that is fit for purpose, developed on time, and within budget remains a challenge. Many researchers have advocated the use of artificial intelligence techniques such as knowledge-based systems, neural networks, and data mining as a way of addressing these difficulties.

Artificial...

The Golden Rule: Safe Strategies of Sage Investors
The Golden Rule: Safe Strategies of Sage Investors

Everything the independent investor needs to know to effectively invest in gold

With today's increasing economic uncertainties, a strong investment strategy is to put a portion of your net worth in gold. However, given investors' overall lack of knowledge about gold as an investment, as wealth insurance, or as a store of...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

R Recipes: A Problem-Solution Approach
R Recipes: A Problem-Solution Approach

R Recipes is your handy problem-solution reference for learning and using the popular R programming language for statistics and other numerical analysis. Packed with hundreds of code and visual recipes, this book helps you to quickly learn the fundamentals and explore the frontiers of programming, analyzing and using R.

...

Real-Time Analytics: Techniques to Analyze and Visualize Streaming Data
Real-Time Analytics: Techniques to Analyze and Visualize Streaming Data

Construct a robust end-to-end solution for analyzing and visualizing streaming data Real-time analytics is the hottest topic in data analytics today. In Real-Time Analytics: Techniques to Analyze and Visualize Streaming Data , expert Byron Ellis teaches data analysts technologies to build an effective real-time analytics platform. This...

Better Business Decisions from Data: Statistical Analysis for Professional Success
Better Business Decisions from Data: Statistical Analysis for Professional Success

Everyone encounters statistics on a daily basis. They are used in proposals, reports, requests, and advertisements, among others, to support assertions, opinions, and theories. Unless you’re a trained statistician, it can be bewildering. What are the numbers really saying or not saying? Better Business Decisions from Data:...

Beginning Power BI with Excel 2013: Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map
Beginning Power BI with Excel 2013: Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map

Understanding your company’s data has never been easier than with Microsoft’s new Power BI package for Excel 2013. Consisting of four powerful tools—Power Pivot, Power View, Power Query and Power Maps—Power BI makes self-service business intelligence a reality for a wide range of users, bridging the traditional gap...

Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges
Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges

This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. The first section of the book provides an overview of developments in data protection in different parts of the world. The second section focuses on one of the most captivating...

Social Media Mining with R
Social Media Mining with R

There’s probably no better place to gain behavioral insights than through social media, but analyzing the mass of data is often difficult. With this book you’ll learn to employ the latest techniques and processes using R.

Overview

  • Learn how to face the challenges of analyzing social media...
Privacy in Social Networks (Synthesis Lecutres on Data Mining and Knowledge Discovery)
Privacy in Social Networks (Synthesis Lecutres on Data Mining and Knowledge Discovery)

This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and...

Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection (Data-Centric Systems and Applications)
Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection (Data-Centric Systems and Applications)

Data matching (also known as record or data linkage, entity resolution, object identification, or field matching) is the task of identifying, matching and merging records that correspond to the same entities from several databases or even within one database. Based on research in various domains including applied statistics, health...

Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy