Home | Amazing | Today | Tags | Publishers | Years | Search 
An Introduction to Neural Networks
An Introduction to Neural Networks
Covers: artificial neurons as models of their real counterparts; the geometry of network action in pattern space; gradient descent methods, including back-propagation; associative memory and Hopfield nets; and self-organization and feature maps.

This book grew out of a set of course notes for a neural networks module given as part of a
...
Projects in Computing and Information Systems: A Student's Guide
Projects in Computing and Information Systems: A Student's Guide
Undertaking a project is a key component of nearly all computing/information systems degree programmes at both undergraduate and postgraduate levels. Projects in Computing and Information Systems covers the four key aspects of project work (planning, conducting, presenting and taking the project further) in chronological fashion, and...
The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
The content goes from the basics to advanced topics such as off-shoring, anti-circumvention, open source business models, user-created content, reverse engineering, mobile media distribution, web and game development, mash-ups, web widgets, and massively multiplayer games.

This book is designed to empower you to:

* Understand
...
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
Addressing this security issue, this volume is divided into eleven parts covering the essentials of information security technologies,
...
Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Soft Methods for Handling Variability and Imprecision (Advances in Soft Computing)
Soft Methods for Handling Variability and Imprecision (Advances in Soft Computing)
Probability theory has been the only well-founded theory of uncertainty for a long time. It was viewed either as a powerful tool for modelling random phenomena, or as a rational approach to the notion of degree of belief. During the last thirty years, in areas centered around decision theory, artificial intelligence and information processing,...
Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Computational Finance Using C and C# (Quantitative Finance)
Computational Finance Using C and C# (Quantitative Finance)
In Computational Finance Using C and C# George Levy raises computational finance to the next level using the languages of both standard C and C#. The inclusion of both these languages enables readers to match their use of the book to their firms internal software and code requirements. Levy also provides derivatives pricing information for:
...
Knowledge Retention: Strategies and Solutions
Knowledge Retention: Strategies and Solutions
‘‘Knowledge Retention: Strategies and Solutions will become paramount toward achieving success in an increasingly competitive environment.’’

—Jay Liebowitz

As the baby boomer generation approaches retirement age, many organizations are facing the potential
...
Propellants and Explosives: Thermochemical Aspects of Combustion
Propellants and Explosives: Thermochemical Aspects of Combustion

Explosives and propellants contain considerable chemical energy that can be converted into rapid expansion. In contrast to the simple burning of a fuel, explosives and propellants are self-contained and do not need an external supply of oxygen via air. Since their energy content inherently creates the risk of accidental triggering of the...

Financial Products: An Introduction using Mathematics and Excel
Financial Products: An Introduction using Mathematics and Excel
Financial Products provides a step-by-step guide to some of the most important ideas in financial mathematics. It describes and explains interest rates, discounting, arbitrage, risk neutral probabilities, forward contracts, futures, bonds, FRA and swaps. It shows how to construct both elementary and complex (Libor) zero curves. Options are...
Healthcare Finance: An Introduction To Accounting And Financial Management
Healthcare Finance: An Introduction To Accounting And Financial Management
Like its predecessors, this introductory text teaches students the fundamental concepts of healthcare finance, including both financial management and accounting. It was developed to be used in clinical and health services administration programs, in which students are primarily trained for careers in provider organizations.

New to the third...

Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy