Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hybrid Algorithms for Service, Computing and Manufacturing Systems: Routing and Scheduling Solutions
Hybrid Algorithms for Service, Computing and Manufacturing Systems: Routing and Scheduling Solutions

In a global, highly competitive environment, organizations face increasing economic pressure and customer demands for more complex products and services. Hybrid algorithms have the potential to play an important role in helping organizations achieve cost reduction and increased product development.

Hybrid Algorithms...

Fuzzy Systems Engineering: Theory and Practice (Studies in Fuzziness and Soft Computing)
Fuzzy Systems Engineering: Theory and Practice (Studies in Fuzziness and Soft Computing)

This book is devoted to reporting innovative and significant progress in fuzzy system engineering. Given the maturation of fuzzy logic, this book is dedicated to exploring the recent breakthroughs in fuzziness and soft computing in favour of intelligent system engineering. This monograph presents novel developments of the fuzzy theory as well as...

Propagation Engineering in Radio Links Design
Propagation Engineering in Radio Links Design

To meet telecommunications demands of the world community, it is crucial to employ radio services. Among vast and fast expansions during recent decades, the satellite services, navigational aids, remote sensing, telemetering, audio and video broadcasting, high-speed data communications, mobile radio systems, and some other special radio...

Algorithmic Adventures: From Knowledge to Magic
Algorithmic Adventures: From Knowledge to Magic
The public image of computer science does not reflect its true nature. The general public and especially high school students identify computer science with a computer driving license. They think that studying computer science is not a challenge, and that anybody can learn it. Computer science is not considered a scientific discipline but a...
Getting Started with Memcached
Getting Started with Memcached

Speed up and scale out your web applications with Memcached

Overview

  • Set up the Memcached service on your server or development machine
  • Use Memcached on your Java, Ruby, Python, and PHP applications
  • Full of practical, real-world examples and easy-to-follow explanations
  • ...
The Fuzzy Systems Handbook: A Practitioner's Guide to Building, Using, and Maintaining Fuzzy Systems/Book and Disk
The Fuzzy Systems Handbook: A Practitioner's Guide to Building, Using, and Maintaining Fuzzy Systems/Book and Disk
My 1965 paper on fuzzy sets was motivated in large measure by the conviction that traditional methods of systems analysis are unsuited for dealing with systems in which relations between variables do not lend themselves to representation in terms of differential or difference equations. Such systems are the norm in biology, sociology, economics...
Mobile Design Pattern Gallery: UI Patterns for Smartphone Apps
Mobile Design Pattern Gallery: UI Patterns for Smartphone Apps

When you’re under pressure to produce a well-designed, easy-to-navigate mobile app, there’s no time to reinvent the wheel—and no need to. This handy reference provides more than 90 mobile app design patterns, illustrated by 1,000 screenshots from current Android, iOS, and Windows Phone apps.

Much has...

Self-Defense Nerve Centers and Pressure Points for Karate, Jujitsu and Atemi-Waza
Self-Defense Nerve Centers and Pressure Points for Karate, Jujitsu and Atemi-Waza
A modern definition of self-defense is in order. One way of defining self-defense is to explain what it is not. Personal self-defense is not warfare; it is not vengeance; it is not an art; it is not a sporting event; it is not a movie or television fight scene.

Self-defense is preparation to minimize the possibility of assault. It is
...
Antenna Theory and Design
Antenna Theory and Design
The first edition of Antenna Theory and Design was published in 1981 and the second in 1998. This three-decade span has seen major expansions of antenna application areas, mainly in wireless communications. Along with technology advances has come public awareness of the presence and importance of antennas. Base station antennas are...
Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
Why Kids Kill: Inside the Minds of School Shooters
Why Kids Kill: Inside the Minds of School Shooters

Ten years after the school massacre at Columbine High School in Colorado, school shootings are a new and alarming epidemic. While sociologists have attributed the trigger of violence to peer pressure, such as bullying and social isolation, prominent...

Guarantee of Peace: The League of Nations in British Policy 1914-1925
Guarantee of Peace: The League of Nations in British Policy 1914-1925

Peter Yearwood reconsiders the League of Nations, not as an attempt to realize an idea but as an element in the day-to-day conduct of Britain's foreign policy and domestic politics during the period 1914-25.

He challenges the usual view that London reluctantly adopted the idea in response to pressure from Woodrow Wilson
...

Result Page: 23 22 21 20 19 18 17 16 15 14 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy