Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Rough Computing: Theories, Technologies and Applications
Rough Computing: Theories, Technologies and Applications
Rough set theory is a new soft computing tool which deals with vagueness and uncertainty. It has attracted the attention of researchers and practitioners worldwide, and has been successfully applied to many fields such as knowledge discovery, decision support, pattern recognition, and machine learning.

Rough Computing: Theories,...

Solar Energy Projects for the Evil Genius
Solar Energy Projects for the Evil Genius
FOLLOW THE SUN TO MORE EVIL FUN!

Let the sun shine on your evil side - and have a wicked amount of fun on your way to becoming a solar energy master! In this guide, the popular Evil Genius format ramps up your understanding of powerful, important, and environmentally friendly solar energy - and shows you how to...

Advances in Knowledge Discovery and Management: Volume 4 (Studies in Computational Intelligence)
Advances in Knowledge Discovery and Management: Volume 4 (Studies in Computational Intelligence)

This book is a collection of representative and novel works done in Data Mining, Knowledge Discovery, Clustering and Classification that were originally presented in French at the EGC'2012 Conference held in Bordeaux, France, on January 2012. This conference was the 12th edition of this event, which takes place each year and which is now...

ASP Made Simple (Made Simple Programming)
ASP Made Simple (Made Simple Programming)
ASP Made Simple provides a brief introduction to ASP for the person who favours self teaching and/or does not have expensive computing facilities to learn on. The book will demonstrate how the principles of ASP can be learned with an ordinary PC running Personal Web Server, MS Access and a general text editor like Notepad.

After working through...

Configuring Windows 2000 Without Active Directory
Configuring Windows 2000 Without Active Directory
In Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to...
The Enterprise Resource Planning Decade: Lessons Learned and Issues for the Future
The Enterprise Resource Planning Decade: Lessons Learned and Issues for the Future

The Enterprise Resource Planning Decade: Lessons Learned and Issues for the Future presents an investigation into the rationale for ERP by raising key questions that managers should ask themselves prior to considering ERP, including processes that should be followed in planning when acquiring ERP.

It concentrates on the impact...

C in Depth :: Easy Beginner's To Expert's Guide.
C in Depth :: Easy Beginner's To Expert's Guide.

Essential C Skills-Made Easy–Without Fear!

This C Programming book gives a good start and complete introduction for C Programming for Beginner’s. Learn the all basics and advanced features of C programming in no time from Bestselling...

Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Linux HPC Cluster Installation
Linux HPC Cluster Installation
Few people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more...
Linux Applications on Pseries
Linux Applications on Pseries
The strengths of the AIX operating system are well known among in the UNIX software community. Its reliability and great degree of scaling make AIX the perfect choice for hosting mission-critical applications. It is a robust and flexible operating system that meets all the requirements for the various demands of e-business environments. At the same...
Moodle 3 Administration - Third Edition
Moodle 3 Administration - Third Edition

Key Features

  • Learn how to plan, install, optimize, customize, and configure Moodle
  • Guarantee a cutting-edge learning experience in a secure and customizable environment while optimizing your day-to-day workload
  • A one-stop guide with a problem-solution approach and a wide range of real-world...
Synthesis of Arithmetic Circuits: FPGA, ASIC and Embedded Systems
Synthesis of Arithmetic Circuits: FPGA, ASIC and Embedded Systems
A new approach to the study of arithmetic circuits

In Synthesis of Arithmetic Circuits: FPGA, ASIC and Embedded Systems, the authors take a novel approach of presenting methods and examples for the synthesis of arithmetic circuits that better reflects the needs of today's computer system designers and engineers....

Result Page: 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy