Home | Amazing | Today | Tags | Publishers | Years | Search 
Tree-Structure based Hybrid Computational Intelligence: Theoretical Foundations and Applications
Tree-Structure based Hybrid Computational Intelligence: Theoretical Foundations and Applications

Research in computational intelligence is directed toward building thinking machines and improving our understanding of intelligence. As evident, the ultimate achievement in this field would be to mimic or exceed human cognitive capabilities including reasoning, recognition, creativity, emotions, understanding, learning and so on. In this book,...

Academic Language/Literacy Strategies for Adolescents: A "How-To" Manual for Educators
Academic Language/Literacy Strategies for Adolescents: A "How-To" Manual for Educators

Fast-paced, practical, and innovative, this text for pre-service and in-service teachers features clear, easily accessible lessons and professional development activities to improve the delivery of academic language/literacy education across the content areas in junior/middle school and high school classrooms. Numerous hands-on tools and...

ITIL V3 Release, Control and Validation (RCV) Full Certification Online Learning and Study Book Course
ITIL V3 Release, Control and Validation (RCV) Full Certification Online Learning and Study Book Course

Who Knew ITIL Certification E-Learning This Quick and Easy Could Make You Look This Good.

'The Art of Service has dramatically changed the way we deliver employee training. We can now deliver more training at less cost to a wider audience in a shorter period of time.'

On-demand eLearning: Don't pay over $ 3,000.00 for a 5 day...

Real-World Flash Game Development: How to Follow Best Practices AND Keep Your Sanity
Real-World Flash Game Development: How to Follow Best Practices AND Keep Your Sanity

This book covers Flash for the everyday developer. The average Flash developer doesn't have luxurious timelines, employers who understand the value of reusability, or the help of an information architect to design a usable experience. This book helps bridge the gap for these coders who may be used to C++, Java, or C# and want to move over...

Close-Up and Macro Photography
Close-Up and Macro Photography
In this exhaustive guide to macro photography, respected author and photographer Adrian Davies takes a comprehensive approach to the subject, covering every aspect of the multi-faceted and often complicated world of close-up photography.

Everything about Adrian's approach is both practical and diverse, with optimal output always in
...
Sacred Wells: A Study in the History, Meaning, and Mythology of Holy Wells & Waters
Sacred Wells: A Study in the History, Meaning, and Mythology of Holy Wells & Waters
Sacred wells are recognized around the world, in nearly every culture and in every age. Long associated with feminine, divine power they are also seen as places of healing, magick,1 wisdom and sources to the Other World. Some believe that these wells were originally created to bring the moon and its powers to the earth, at least in its reflection....
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

ModSecurity 2.5
ModSecurity 2.5
With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you...
Linux Email
Linux Email
Many businesses want to run their email servers on Linux for greater control and flexibility of corporate communications, but getting started can be complicated. The attractiveness of a free-to-use and robust email service running on Linux can be undermined by the apparent technical challenges involved. Some of the complexity arises from the fact...
Biocommunication and Natural Genome Editing
Biocommunication and Natural Genome Editing

This is the first uniform description of all key levels of communication in the organismic kingdoms of plants, fungi, animals and bacteria based on the most recent empirical data. Biocommunication occurs on three levels (A) intraorganismic, i.e. intra- and intercellular, (B) interorganismic, between the same or related species and (C)...

Video Compression Systems: From first principles to concatenated codecs (Iet Telecommuncations)
Video Compression Systems: From first principles to concatenated codecs (Iet Telecommuncations)
-Traces history of video compression systems from low bit rate compression to today's high quality HDTV compression

-Accessible to a wide audience - complicated processes are explained using figures and diagrams with descriptions of the algorithms.

This book gives an overview on many practical aspects of video compression systems used...

Handbook of Ambient Intelligence and Smart Environments
Handbook of Ambient Intelligence and Smart Environments

Ambient Intelligence (AmI) has recently been adopted as a term referring to a multidisciplinary subject which embraces a variety of pre-existing fields of computer science and engineering. Given the diversity of potential applications this relationship naturally extends to other areas of science, such as education, health and social care,...

Result Page: 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy