Home | Amazing | Today | Tags | Publishers | Years | Search 
Bayesian Biostatistics and Diagnostic Medicine
Bayesian Biostatistics and Diagnostic Medicine
Bayesian methods are being used more often than ever before in biology and medicine. For example, at the University of Texas MD Anderson Cancer Center, Bayesian sequential stopping rules routinely are used for the design of clinical trials. This book is based on the author’s experience working with a variety of...
Radiation Dose from Adult and Pediatric Multidetector Computed Tomography (Medical Radiology / Diagnostic Imaging)
Radiation Dose from Adult and Pediatric Multidetector Computed Tomography (Medical Radiology / Diagnostic Imaging)
The use of computed tomography (CT) has seen enormous growth over the past decade. In the US, approximately 63 million examinations were performed in 2005 (Niagara Health Quality Coalition 2004) compared to 35 million in 2000. The increased number of clinical applications (e.g., in emergency and trauma, paediatric, cardiac, and...
Machine Learning and Data Mining
Machine Learning and Data Mining
The book describes the basics of machine learning principles and algorithms that are used in data mining and is intended for students of computer science, researchers who need to adapt various algorithms for particular data mining tasks, and for education of sophisticated users of machine learning and data mining tools.

...
All the Mathematics You Missed: But Need to Know for Graduate School
All the Mathematics You Missed: But Need to Know for Graduate School
Math is Exciting. We are living in the greatest age of mathematics ever seen. In the 1930s, there were some people who feared that the rising abstractions of the early twentieth century would either lead to mathematicians working on sterile, silly intellectual exercises or to mathematics splitting into sharply distinct...
Immunodominance
Immunodominance
The normal, intact immune system does not have equal probability of responding to every potential part of a protein. It has been known for more than 50 years that only parts of the protein that are “outside” are available for antibody binding. Yet, with the advent of Western blotting techniques, antibodies that react...
Sets, Logic and Maths for Computing (Undergraduate Topics in Computer Science)
Sets, Logic and Maths for Computing (Undergraduate Topics in Computer Science)
The first part of this preface is for the student, the second for the instructor. Some readers may find it helpful to look at both.Whoever you are, welcome!

This easy-to-follow textbook introduces the mathematical language, knowledge and problem-solving skills that undergraduates need to study computing. The language is in part...

Fuzzy Optimization: Recent Advances and Applications (Studies in Fuzziness and Soft Computing)
Fuzzy Optimization: Recent Advances and Applications (Studies in Fuzziness and Soft Computing)
Optimization is an extremely important area in science and technology which provides powerful and useful tools and techniques for the formulation and solution of a multitude of problems in which we wish, or need, to find a best possible option or solution. It has been an important area of research for more than half a century,...
Discrete Mathematics for Computer Scientists
Discrete Mathematics for Computer Scientists

Many colleges and universities offer a course in discrete mathematics. Students taking these courses are from many disciplines, one of the largest being computer science. As a part of the Mathematics Across the Curriculum project at Dartmouth, supported by the National Science Foundation,1 we proposed to create a discrete mathematics...

The Bayesian Choice: From Decision-Theoretic Foundations to Computational Implementation (Springer Texts in Statistics)
The Bayesian Choice: From Decision-Theoretic Foundations to Computational Implementation (Springer Texts in Statistics)

The main purpose of statistical theory is to derive from observations of a random phenomenon an inference about the probability distribution underlying this phenomenon. That is, it provides either an analysis (description) of a past phenomenon, or some predictions about a future phenomenon of a similar nature. In this book, we insist...

Introduction to Cryptography
Introduction to Cryptography

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Knowledge Discovery from Data Streams (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Knowledge Discovery from Data Streams (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)

In the last three decades, machine learning research and practice have focused on batch learning usually using small datasets. In batch learning, the whole training data is available to the algorithm, which outputs a decision model after processing the data eventually (or most of the times) multiple times. The rationale behind this...

Introduction to Cryptography (Undergraduate Texts in Mathematics)
Introduction to Cryptography (Undergraduate Texts in Mathematics)

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy