Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
We describe in this book, bio-inspired models and applications of hybrid intelligent systems using soft computing techniques for image analysis and pattern recognition based on biometrics and other information sources. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks,...
Wireless Information Networks (Wiley Series in Telecommunications and Signal Processing)
Wireless Information Networks (Wiley Series in Telecommunications and Signal Processing)
Towards location aware mobile ad hoc sensors

A Systems Engineering Approach to Wireless Information Networks

The Second Edition of this internationally respected textbook brings readers fully up to date with the myriad of developments in wireless communications. When first published in 1995, wireless communications was synonymous...

Laszlo in Action
Laszlo in Action
Laszlo in Action is the first comprehensive guide to the Laszlo system and its language LZX. OpenLaszlo is an increasingly popular open-source platform for the development and delivery of rich internet applications across multiple platforms: Flash, DHTML, and J2ME. The dramatic emergence of Ajax over the past year was a first step in the...
PC Audio Editing with Adobe Audition 2.0: Broadcast, desktop and CD audio production
PC Audio Editing with Adobe Audition 2.0: Broadcast, desktop and CD audio production

At first glance . . . Adobe’s Audition seems to be a fairly simple and straightforward audio editing program. That’s because it is! But don’t let that intuitive GUI (graphic user interface) fool you – it’s an extremely powerful editor that has worked its way into the mainstay of the audio production industry, one...

Wireless Networks
Wireless Networks
The field of wireless networks has witnessed tremendous growth in recent years causing it to become one of the fastest growing segments of the telecommunications industry. As wireless networks evolve with increasing size and profitability, they will be able to integrate with other wireless technologies enabling them to support mobile computing...
Solid-State Mid-Infrared Laser Sources (Topics in Applied Physics)
Solid-State Mid-Infrared Laser Sources (Topics in Applied Physics)
According to the Encyclopaedia Britannica, the "middle infrared" region covers the portion of the electromagnetic spectrum between 400 and 4000 wave numbers, which corresponds to the wavelength range 2.5-25 gin. This range is of particular interest for many applications, especially for spectroscopy, since the electromagnetic frequencies...
Swift 2 for Absolute Beginners
Swift 2 for Absolute Beginners

Swift 2 for Absolute Beginners is perfect for those with no programming background, those with some programming experience but no object-oriented experience, or those that have a great idea for an app but haven’t programmed since school, and it is now updated for Swift 2.

Gary Bennett and Brad Lees are full-time...

Fuzzy Modeling with Spatial Information for Geographic Problems
Fuzzy Modeling with Spatial Information for Geographic Problems
"Fuzzy Modelling … is a collection of papers of diverse but interrelated topics on the use of fuzzy logic … . The reader is given enough information and references … . this book will provide an excellent background on fuzzy logic and how it can be applied to a variety of spatial problems. It is also a valuable information...
Exploring IBM eServer zSeries and S/390 Servers: See Why IBM's Redesigned Mainframe Computer Family Has Become More Popular than Ever!
Exploring IBM eServer zSeries and S/390 Servers: See Why IBM's Redesigned Mainframe Computer Family Has Become More Popular than Ever!
Considered the bible of the IBM zSeries and S/390 world, this new edition closely examines the role large computers will play in the new century. All the new hardware models and operating system products—Linux, VSE, MVS, VM, AIX, and Open Edition—are now available for the zSeries and are fully explained, as are critical business issues...
Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Parallel Evolutionary Computations (Studies in Computational Intelligence)
Parallel Evolutionary Computations (Studies in Computational Intelligence)
"Parallel Evolutionary Computation" focuses on the aspects related to the parallelization of evolutionary computations, such as parallel genetic operators, parallel fitness evaluation, distributed genetic algorithms, and parallel hardware implementations, as well as on their impact on several applications.The book is divided into four...
Emerging Web Services Technology (Whitestein Series in Software Agent Technologies and Autonomic Computing)
Emerging Web Services Technology (Whitestein Series in Software Agent Technologies and Autonomic Computing)
This book contains initial results of innovative and sometimes controversial emerging Web services research ideas. It covers a wide spectrum of active research areas like Model Driven Engineering for SOA, Mobility and Services, Dynamic Web Service Discovery and Composition, Service Management, and Semantic Web, just to name a few.

As Web...

Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy