Home | Amazing | Today | Tags | Publishers | Years | Search 
Support Vector Machines: Theory and Applications (Studies in Fuzziness and Soft Computing)
Support Vector Machines: Theory and Applications (Studies in Fuzziness and Soft Computing)

The support vector machine (SVM) is a supervised learning method that generates input-output mapping functions from a set of labeled training data. The mapping function can be either a classification function, i.e., the category of the input data, or a regression function. For classification, nonlinear kernel functions are often used to...

Microsoft Access 2007 Data Analysis
Microsoft Access 2007 Data Analysis
Chart a course for more effective data analysis

Data analysis is more than crunching numbers and turning them into charts and graphs. Certainly Excel can do that, but you may be surprised to discover that Access 2007 offers powerful functionality that may be even better suited to your data analysis needs. Learn to analyze...

Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Traditional data mining methods are designed to deal with “static” databases, i.e. databases where the ordering of records (or other database objects) has nothing to do with the patterns of interest. Though the assumption of order irrelevance may be sufficiently accurate in some applications, there are certainly many other cases, where...
Towards a New Evolutionary Computation: Advances on Estimation of Distribution Algorithms
Towards a New Evolutionary Computation: Advances on Estimation of Distribution Algorithms
Estimation of Distribution Algorithms (EDAs) are a set of algorithms in the Evolutionary Computation (EC) field characterized by the use of explicit probability distributions in optimization. Contrarily to other EC techniques such as the broadly known Genetic Algorithms (GAs) in EDAs, the crossover and mutation operators are substituted by the...
Asymmetry: The Foundation of Information (The Frontiers Collection)
Asymmetry: The Foundation of Information (The Frontiers Collection)
Objects have the capacity to distinguish themselves from other objects and from themselves at different times. The interaction of objects, together with the process of making distinctions, results in the transfer of a quantity that we call information. Some objects are capable of distinguishing themselves in more ways than others. These objects...
Grey Information: Theory and Practical Applications (Advanced Information and Knowledge Processing)
Grey Information: Theory and Practical Applications (Advanced Information and Knowledge Processing)
This book is a crystallization of the authors' work over the last twenty-five years. The book covers the latest advances in grey information and systems research, providing a state-of-the-art overview of this important field. Covering the theoretical foundation, fundamental methods and main topics in grey information and systems research, this book...
Network Protocols Handbook
Network Protocols Handbook
We are living in the IT(Information Technologies) times. The IT provides us many powerful tools that have significantly changed our way of life, work and business operations. Among all the IT advancements, Internet has the most impact in every aspect of our society for the past 20 years. From Internet, people can get instant news, communicate with...
Self-Similar Processes in Telecommunications
Self-Similar Processes in Telecommunications

For the first time the problems of voice services self-similarity are discussed systematically and in detail with specific examples and illustrations.

‘Self-Similar Processes in Telecommunications’ considers the self-similar (fractal and multifractal) models of telecommunication traffic and efficiency...

Advances in Data Analysis: Proceedings of the 30th Annual Conference
Advances in Data Analysis: Proceedings of the 30th Annual Conference
The book focuses on exploratory data analysis, learning of latent structures in datasets, and unscrambling of knowledge. It covers a broad range of methods from multivariate statistics, clustering and classification, visualization and scaling as well as from data and time series analysis. It provides new approaches for information retrieval and...
Dynamical Vision: ICCV 2005 and ECCV 2006 Workshops, WDV 2005 and WDV 2006, Beijing, China, October 21, 2005, Graz, Austria, May 13, 2006
Dynamical Vision: ICCV 2005 and ECCV 2006 Workshops, WDV 2005 and WDV 2006, Beijing, China, October 21, 2005, Graz, Austria, May 13, 2006
Classical multiple-view geometry studies the reconstruction of a static scene observed by a rigidly moving camera. However, in many real-world applications the scene may undergo much more complex dynamical changes. For instance, the scene may consist of multiple moving objects (e.g., a traffic scene) or articulated motions (e.g., a walking human)...
Data Quality: Concepts, Methodologies and Techniques (Data-Centric Systems and Applications)
Data Quality: Concepts, Methodologies and Techniques (Data-Centric Systems and Applications)
Poor data quality can seriously hinder or damage the efficiency and effectiveness of organizations and businesses. The growing awareness of such repercussions has led to major public initiatives like the "Data Quality Act" in the USA and the "European 2003/98" directive of the European Parliament.

Batini and...

Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric...
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy