Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fuzzy Logic and Probability Applications: A Practical Guide
Fuzzy Logic and Probability Applications: A Practical Guide

Probability theory and fuzzy logic are the principal components of an array of methodologies for dealing with problems in which uncertainty and imprecision play important roles. In relation to probability theory, fuzzy logic is a new kid on the block. As such, it has been and continues to be, though to a lesser degree, an object of...

Computational Intelligence in Time Series Forecasting: Theory and Engineering Applications
Computational Intelligence in Time Series Forecasting: Theory and Engineering Applications

Foresight can be crucial in process and production control, production-and-resources planning and in management decision making generally. Although forecasting the future from accumulated historical data has become a standard and reliable method in production and financial engineering, as well as in business and management, the use of time...

Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Do you really understand your online presence? Are you confident that visitors can use your website? Do you know their motivations? How do online communities perceive your company? To innovate and adapt your business quickly, you must know the answers to these questions. Complete Web Monitoring demonstrates how to measure every aspect of your web...
12 Essential Skills for Software Architects
12 Essential Skills for Software Architects
As you start reading this book, I hope you are prepared to keep an open mind and are willing to try some new approaches to your daily life.

My name is Dave Hendricksen, and I have the privilege of being a software architect for Thomson Reuters, where the focus of my work is on producing intelligent legal
...
Math You Can't Use: Patents, Copyright, and Software
Math You Can't Use: Patents, Copyright, and Software
The field of software is awash in disputes. Market participants and analysts routinely disagree on how computer programs should be produced, marketed, regulated, and sold. On one subject, however, just about everyone can agree: the current intellectual property protection regime for software is a mess. At present, all of the traditional means...
Outsource It!: A No-Holds-Barred Look at the Good, the Bad, and the Ugly of Offshoring Tech Projects
Outsource It!: A No-Holds-Barred Look at the Good, the Bad, and the Ugly of Offshoring Tech Projects

If you need to expand your business but not your budget, if your group has an intense but short-term project, if you don't have the skill set to get a job done-it's time to think about outsourcing. Starting from the first step (should you outsource part of your tech work?) to the last (how can you protect your intellectual...

Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation
Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation

This volume contains a collection of studies in the areas of complexity theory and foundations of cryptography. These studies were conducted at different times during the last couple of decades. Although many of these studies have been referred to by other works, none of them was formally published before.

Indeed, this volume...

The AWK Programming Language
The AWK Programming Language

Computer users spend a lot of time doing simple, mechanical data manipulation - changing the format of data, checking its validity, finding items with some property, adding up numbers, printing reports, and the like. All of these jobs ought to be mechanized, but it's a real nuisance to have to write a specialpurpose program in a...

Get Good with Money: Ten Simple Steps to Becoming Financially Whole
Get Good with Money: Ten Simple Steps to Becoming Financially Whole
NEW YORK TIMES, WALL STREET JOURNAL, AND USA TODAY BESTSELLER • A ten-step plan for finding peace, safety, and harmony with your money—no matter how big or small your goals and no matter how rocky the market might be—by the inspiring and savvy “Budgetnista.”

...
Instant Website Optimization for Retina Displays How-to
Instant Website Optimization for Retina Displays How-to

Learning simple techniques which will make your website look stunning on high-definition Retina Displays

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Create high-resolution graphics for websites.
  • Learn to create...
Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach (SpringerBriefs in Speech Technology)
Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach (SpringerBriefs in Speech Technology)
This book discusses digital audio watermarking copyright assurance. The author first outlines the topic of watermarking data that can be used for copyright assurance that incorporates text messages, copyright audio, handwritten text, logo and cell phone numbers. The objective of this book is to propose a new algorithm that can embed and extract...
Architectural Design of Multi-Agent Systems: Technologies and Techniques (Premier Reference Series)
Architectural Design of Multi-Agent Systems: Technologies and Techniques (Premier Reference Series)
Multi-agent systems (MAS) have emerged as a new methodology to address the issues in organizing large-scale software systems. This methodology provides a conceptual model that helps maintaining constraints, a task conventional software engineering is unable to achieve. In recent years, MAS has been used in various areas in computer science and...
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy