Home | Amazing | Today | Tags | Publishers | Years | Search 
Advances in Intelligent Signal Processing and Data Mining: Theory and Applications (Studies in Computational Intelligence)
Advances in Intelligent Signal Processing and Data Mining: Theory and Applications (Studies in Computational Intelligence)

The book presents some of the most efficient statistical and deterministic methods for information processing and applications in order to extract targeted information and find hidden patterns. The techniques presented range from Bayesian approaches and their variations such as sequential Monte Carlo methods, Markov Chain Monte Carlo filters,...

Insect Resistance Management, Second Edition: Biology, Economics, and Prediction
Insect Resistance Management, Second Edition: Biology, Economics, and Prediction

Neither pest management nor resistance management can occur with only an understanding of pest biology. For years, entomologists have understood, with their use of economic thresholds, that at least a minimal use of economics was necessary for proper integrated pest management. IRM is even more complicated and dependent on understanding and...

Bayesian Analysis of Item Response Theory Models Using SAS
Bayesian Analysis of Item Response Theory Models Using SAS

Written especially for psychometricians, scale developers, and practitioners interested in applications of Bayesian estimation and model checking of item response theory (IRT) models, this book teaches you how to accomplish all of this with the SAS MCMC Procedure. Because of its tutorial structure, Bayesian Analysis of Item Response...

Physical Layer Security in Wireless Communications (Wireless Networks and Mobile Communications)
Physical Layer Security in Wireless Communications (Wireless Networks and Mobile Communications)

Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the...

Automatic Design of Decision-Tree Induction Algorithms (SpringerBriefs in Computer Science)
Automatic Design of Decision-Tree Induction Algorithms (SpringerBriefs in Computer Science)

Presents a detailed study of the major design components that constitute a top-down decision-tree induction algorithm, including aspects such as split criteria, stopping criteria, pruning and the approaches for dealing with missing values. Whereas the strategy still employed nowadays is to use a 'generic' decision-tree induction...

MVVM in Delphi: Architecting and Building Model View ViewModel Applications
MVVM in Delphi: Architecting and Building Model View ViewModel Applications
Dive into the world of MVVM, learn how to build modern Windows applications, and prepare for cross-platform development. This book introduces you to the right mindset and demonstrates suitable methodologies that allow for quick understanding of the MVVM paradigm. MVVM in Delphi shows you how to use a quick and efficient MVVM...
Granular Computing: Analysis and Design of Intelligent Systems (Industrial Electronics)
Granular Computing: Analysis and Design of Intelligent Systems (Industrial Electronics)

Information granules, as encountered in natural language, are implicit in nature. To make them fully operational so they can be effectively used to analyze and design intelligent systems, information granules need to be made explicit. An emerging discipline, granular computing focuses on formalizing information granules and unifying them to...

Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka
Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka

Learn how to integrate full-stack open source big data architecture and to choose the correct technology―Scala/Spark, Mesos, Akka, Cassandra, and Kafka―in every layer. 

Big data architecture is becoming a requirement for many different enterprises. So far, however, the focus has largely been on collecting,...

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

Game Design Theory: A New Philosophy for Understanding Games
Game Design Theory: A New Philosophy for Understanding Games

Despite the proliferation of video games in the twenty-first century, the theory of game design is largely underdeveloped, leaving designers on their own to understand what games really are. Helping you produce better games, Game Design Theory: A New Philosophy for Understanding Games presents a bold new path for...

The War on Cancer: An Anatomy of Failure, A Blueprint for the Future
The War on Cancer: An Anatomy of Failure, A Blueprint for the Future

After reviewing the history of cancer and its impact on the population, Dr. Faguet exposes the antiquated notions that have driven cancer drug development, documents the stagnation in treatment outcomes despite major advances in cancer genomics and growing NCI budgets, and identifies the multiple factors that sustain the status quo. He shows...

The Fuzzy Systems Handbook: A Practitioner's Guide to Building, Using, and Maintaining Fuzzy Systems/Book and Disk
The Fuzzy Systems Handbook: A Practitioner's Guide to Building, Using, and Maintaining Fuzzy Systems/Book and Disk
My 1965 paper on fuzzy sets was motivated in large measure by the conviction that traditional methods of systems analysis are unsuited for dealing with systems in which relations between variables do not lend themselves to representation in terms of differential or difference equations. Such systems are the norm in biology, sociology, economics...
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy