Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Models and Algorithms for Global Optimization: Essays Dedicated to Antanas Žilinskas on the Occasion of His 60th Birthday (Springer Optimization and Its Applications)
Models and Algorithms for Global Optimization: Essays Dedicated to Antanas Žilinskas on the Occasion of His 60th Birthday (Springer Optimization and Its Applications)

The research of Antanas Zilinskas has focused on developing models for global optimization, implementing and investigating the corresponding algorithms, and applying those algorithms to practical problems. This volume, dedicated to Professor Zilinskas on the occasion of his 60th birthday, contains new survey papers in which leading...

Active Rules in Database Systems (Monographs in Computer Science)
Active Rules in Database Systems (Monographs in Computer Science)
A timely survey of the field from the point of view of some of the subject's most active researchers. Divided into several parts organized by theme, the book first covers the underlying methodology regarding active rules, followed by formal specification, rule analysis, performance analysis, and support tools. It then moves on to the...
Digital Geometry Algorithms: Theoretical Foundations and Applications to Computational Imaging (Lecture Notes in Computational Vision and Biomechanics)
Digital Geometry Algorithms: Theoretical Foundations and Applications to Computational Imaging (Lecture Notes in Computational Vision and Biomechanics)
Digital geometry emerged as an independent discipline in the second half of the last century. It deals with geometric properties of digital objects and is developed with the unambiguous goal to provide rigorous theoretical foundations for devising new advanced approaches and algorithms for various problems of visual computing. Different aspects...
Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science)
Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science)
Inference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, is about finding tradeoffs to the tension between the increasing societal need for accurate statistical data and the legal and ethical obligation to protect privacy of individuals and enterprises which are the source...
Computational Physics: Problem Solving with Python
Computational Physics: Problem Solving with Python
The use of computation and simulation has become an essential part of the scientific process. Being able to transform a theory into an algorithm requires significant theoretical insight, detailed physical and mathematical understanding, and a working level of competency in programming.

This upper-division text provides an
...
Deep Learning with Python: A Hands-on Introduction
Deep Learning with Python: A Hands-on Introduction
Discover the practical aspects of implementing deep-learning solutions using the rich Python ecosystem. This book bridges the gap between the academic state-of-the-art and the industry state-of-the-practice by introducing you to deep learning frameworks such as Keras, Theano, and Caffe. The practicalities of these frameworks is often...
MySQL/PHP Database Applications
MySQL/PHP Database Applications
MySQL/PHP Database Applications Affordable Open Source Solutions to E-Commerce Challenges In this unique guide, two Web development gurus show you how to harness the open source power of MySQL and PHP — and create high-performance Web database applications that won't break the bank. Using plenty of ready-to-run code and seven concrete...
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Electrical Engineering: Principles and Applications (5th Edition)
Electrical Engineering: Principles and Applications (5th Edition)

For undergraduate introductory or survey courses in electrical engineering.

 

ELECTRICAL ENGINEERING: PRINCIPLES AND APPLICATIONS, 5/e helps students learn electrical-engineering fundamentals with minimal frustration. Its goals are to...

Underwater Robots: Motion and Force Control of Vehicle-Manipulator Systems
Underwater Robots: Motion and Force Control of Vehicle-Manipulator Systems

This book deals with the main control aspects in underwater manipulation tasks. The mathematical model with significant impact on the control strategy is discussed. The problem of controlling a 6-degrees-of-freedoms autonomous underwater vehicle is deeply investigated and a survey of fault detection/tolerant strategies for unmanned underwater...

Kinematic Self-Replicating Machines
Kinematic Self-Replicating Machines
The principal goal of molecular nanotechnology (MNT) is to develop a manufacturing technology able to inexpensively manufacture most arrangements of atoms that are consistent with physical law. In terms of its precision, flexibility, and low cost, this will be the ultimate manufacturing technology in human history. Two central mechanisms have been...
Result Page: 52 51 50 49 48 47 46 45 44 43 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy