Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Essentials of Technical Analysis for Financial Markets
Essentials of Technical Analysis for Financial Markets

Comprehensive, accessible guide to technical analysis and market trading strategies

Essentials of Technical Analysis for Financial Markets is an all-encompassing handbook on navigating the financial markets successfully using technical analysis. Clearly written, easy-to-understand, and straightforward, this guide...

Handbook of Multisensor Data Fusion
Handbook of Multisensor Data Fusion

Multisensor data fusion is an emerging technology with important applications in both the military and civilian sectors, such as target recognition, robotics, medical diagnostics, and "smart" buildings. It draws on techniques from wide-ranging disciplines, including artificial intelligence, pattern recognition, and statistical...

Handbook of Space Astronomy and Astrophysics
Handbook of Space Astronomy and Astrophysics

Fully updated with data from space-based observations and a comprehensive index and bibliography, this third edition contains the most frequently used information in modern astrophysics. As well as a vast number of tables, graphs, diagrams and formulae it also contains information covering topics including atomic physics, nuclear physics,...

Laws of Small Numbers: Extremes and Rare Events
Laws of Small Numbers: Extremes and Rare Events

Since the publication of the first edition of this seminar book in 1994, the theory and applications of extremes and rare events have enjoyed an enormous and still increasing interest. The intention of the book is to give a mathematically oriented development of the theory of rare events underlying various applications. This characteristic of...

Introduction to Cryptography
Introduction to Cryptography

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on...

Knowledge Discovery from Data Streams (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Knowledge Discovery from Data Streams (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)

In the last three decades, machine learning research and practice have focused on batch learning usually using small datasets. In batch learning, the whole training data is available to the algorithm, which outputs a decision model after processing the data eventually (or most of the times) multiple times. The rationale behind this...

Stochastic Analysis in Production Process and Ecology Under Uncertainty
Stochastic Analysis in Production Process and Ecology Under Uncertainty

The monograph addresses a problem of stochastic analysis based on the uncertainty assessment by simulation and application of this method in ecology and steel industry under uncertainty. The first chapter defines the Monte Carlo (MC) method and random variables in stochastic models. Chapter two deals with the contamination transport in porous...

Dynamics of Complex Systems (Studies in Nonlinearity)
Dynamics of Complex Systems (Studies in Nonlinearity)
The study of complex systems in a unified framework has become recognized in recent years as a new scientific discipline, the ultimate in the interdisciplinary fields. Breaking down the barriers between physics, chemistry, and biology and the so-called soft sciences of psychology, sociology, economics and anthropology, this text explores the...
Quantum Bio-informatics IV: From Quantum Information to Bio-informatics (Qp-Pq: Quantum Probability and White Noise Analysis)
Quantum Bio-informatics IV: From Quantum Information to Bio-informatics (Qp-Pq: Quantum Probability and White Noise Analysis)

The purpose of this proceedings volume is to return to the starting point of bio-informatics and quantum information, fields that are growing rapidly at present, and to seriously attempt mutual interaction between the two, with a view to enumerating and solving the many fundamental problems they entail. For such a purpose, we look for...

Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required...
Fuzzy Optimization: Recent Advances and Applications (Studies in Fuzziness and Soft Computing)
Fuzzy Optimization: Recent Advances and Applications (Studies in Fuzziness and Soft Computing)
Optimization is an extremely important area in science and technology which provides powerful and useful tools and techniques for the formulation and solution of a multitude of problems in which we wish, or need, to find a best possible option or solution. It has been an important area of research for more than half a century,...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy