Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Mining with Computational Intelligence (Advanced Information and Knowledge Processing)
Data Mining with Computational Intelligence (Advanced Information and Knowledge Processing)
Nowadays data accumulate at an alarming speed in various storage devices,
and so does valuable information. However, it is difficult to understand information
hidden in data without the aid of data analysis techniques, which
has provoked extensive interest in developing a field separate from machine
learning. This new field is
...
Introduction to Logistics Systems Planning and Control (Wiley Interscience Series in Systems and Optimization)
Introduction to Logistics Systems Planning and Control (Wiley Interscience Series in Systems and Optimization)
Logistic systems constitute one of the cornerstones in the design and control of production systems and the modelling of supply chains. They are key to a number of industries, and courses teaching logistics systems planning and control are becoming more widespread. Introduction to Logistics Systems Planning and Control is the first book to...
Ultra-Wideband Communications: Fundamentals and Applications (Communications Engineering and Emerging Technologies)
Ultra-Wideband Communications: Fundamentals and Applications (Communications Engineering and Emerging Technologies)

Ultra-wideband (UWB) radios are expected to play a revolutionary role in the future of wireless communications systems. The great interest in UWB communications was sparked by FCC rulings in February 2002 that authorized the unlicensed commercial deployment of UWB technology under a strict power control in 7500 MHz of spectrum. This...

Ambient Intelligence: A Novel Paradigm
Ambient Intelligence: A Novel Paradigm
If the space around us could adapt to our needs and intentions, then our lives
would be much simpler. We would have to spend less time on our daily chores,
we would be more productive and, hopefully, we would live in a less worrisome
and, most likely, more secure world.

Ideally, it would be great if we could live our lives
...
Principles of Model Checking
Principles of Model Checking
Our growing dependence on increasingly complex computer and software systems necessitates the development of formalisms, techniques, and tools for assessing functional properties of these systems. One such technique that has emerged in the last twenty years is model checking, which systematically (and automatically) checks whether a model of a...
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
I graduated from Long Island University in 1991 with a bachelor’s degree in political science. In the years since, much of the specifi c material I learned has been forgotten in the whirlwind of family and career life. Even so, there are some important lessons I still recall. Dr. Donald Baker often told us undergraduate students that states...
Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
The Artful Universe Expanded
The Artful Universe Expanded
Our love of art, writes John Barrow, is the end product of millions of years of evolution. How we react to a beautiful painting or symphony draws upon instincts laid down long before humans existed. Now, in this enhanced edition of the highly popular The Artful Universe, Barrow further explores the close ties between our aesthetic appreciation and...
The Science and Art of Using Telescopes (Patrick Moore's Practical Astronomy Series)
The Science and Art of Using Telescopes (Patrick Moore's Practical Astronomy Series)
Amateur astronomers have to start somewhere. Most begin by buying a modest astronomical telescope and getting to know the night sky. After a while, many want to move on to the next stage, but this can be problematic. The magazines advertise a mass of commercially-made equipment – some of it very expensive – which can represent a major...
Transactions on Edutainment I (Lecture Notes in Computer Science / Transactions on Edutainment) (No. 1)
Transactions on Edutainment I (Lecture Notes in Computer Science / Transactions on Edutainment) (No. 1)

This journal subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, empirical investigations, state-of-the-art methods, and tools in all different genres of Edutainment, such as Game-based Learning and Serious Games, Interactive Storytelling, Virtual Learning Environments, VR-based...

Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

RFID Systems: Research Trends and Challenges
RFID Systems: Research Trends and Challenges

This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems

In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews...

Result Page: 442 441 440 439 438 437 436 435 434 433 432 431 430 429 428 427 426 425 424 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy