Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Data Mining Using SAS Enterprise Miner
Introduction to Data Mining Using SAS Enterprise Miner

If you have an abundance of data, but no idea what to do with it, this book was written for you! Packed with examples from an array of industries, Introduction to Data Mining Using SAS Enterprise Miner provides you with excellent starting points and practical guidelines to begin data mining today. Author Patricia Cerrito encourages you to...

Data Mining: Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems)
Data Mining: Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems)

We are deluged by data—scientific data, medical data, demographic data, financial data, and marketing data. People have no time to look at this data. Human attention has become a precious resource. So, we must find ways to automatically analyze the data, to automatically classify it, to automatically summarize it, to...

Meta-Learning in Computational Intelligence (Studies in Computational Intelligence)
Meta-Learning in Computational Intelligence (Studies in Computational Intelligence)

In the early days of pattern recognition and statistical data analysis life was rather simple: datasets were relatively small, collected from well-designed experiments, analyzed using a few methods that had good theoretical background. Explosive growth of the use of computers led to the creation of huge amounts of data of all kinds,...

Statistical Bioinformatics: with R
Statistical Bioinformatics: with R

Bioinformatics is an emerging field in which statistical and computational techniques are used extensively to analyze and interpret biological data obtained from high-throughput genomic technologies. Genomic technologies allow us to monitor thousands of biological processes going on inside living organisms in one snapshot, and are...

Elements of Artificial Neural Networks (Complex Adaptive Systems)
Elements of Artificial Neural Networks (Complex Adaptive Systems)

Elements of Artificial Neural Networks provides a clearly organized general introduction, focusing on a broad range of algorithms, for students and others who want to use neural networks rather than simply study them.The authors, who have been developing and team teaching the material in a one-semester course over the past six years, describe...

The Oracle Universal Content Management Handbook
The Oracle Universal Content Management Handbook

Enterprise Content Management (ECM) is getting a lot of attention in corporations around the world today. Corporations create a large amount of unstructured content in the form of documents, scanned content, videos, audio, photos, images, and so on. Some statistics show that more than 80 percent of a corporation's intellectual property...

Computer Processing of Remotely-Sensed Images: An Introduction
Computer Processing of Remotely-Sensed Images: An Introduction

Environmental remote sensing is the measurement, from a distance, of the spectral features of the Earth’s surface and atmosphere. These measurements are normally made by instruments carried by satellites or aircraft, and are used to infer the nature and characteristics of the land or sea surface, or of the atmosphere, at the...

Managing and Using Information Systems: A Strategic Approach (Wiley Series in Probability and Statistics)
Managing and Using Information Systems: A Strategic Approach (Wiley Series in Probability and Statistics)

Managers do not have the luxury of abdicating participation in information systems decisions.Managers who choose to do so risk limiting their future business options. Information systems are at the heart of virtually every business interaction, process, and decision, especially when one considers the vast penetration of the Web in the...

Linux Command Line and Shell Scripting Bible, Second Edition
Linux Command Line and Shell Scripting Bible, Second Edition

Welcome to the second edition of Linux Command Line and Shell Scripting Bible. Like all books in the Bible series, you can expect to find both hands-on tutorials and real-world information, as well as reference and background information that provides a context for what you are learning. This book is a fairly comprehensive resource on the...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Statistical and Machine Learning Approaches for Network Analysis (Wiley Series in Computational Statistics)
Statistical and Machine Learning Approaches for Network Analysis (Wiley Series in Computational Statistics)

Explore the multidisciplinary nature of complex networks through machine learning techniques

Statistical and Machine Learning Approaches for Network Analysis provides an accessible framework for structurally analyzing graphs by bringing together known and novel approaches on graph classes and graph measures for...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Result Page: 76 75 74 73 72 71 70 69 68 67 66 65 64 63 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy