Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
System Reengineering in Healthcare: Application for Hospital Emergency Departments (Studies in Systems, Decision and Control)
System Reengineering in Healthcare: Application for Hospital Emergency Departments (Studies in Systems, Decision and Control)

This book presents an advanced systematic mapping review (SMR) and state-of-the-art taxonomy of emergency departments (EDs). Focusing on the patients’ level of fulfilment and how it can be enhanced, it examines existing problems like waiting periods and overcrowding and how these can be alleviated to provide a better service....

Python: Master the Art of Design Patterns
Python: Master the Art of Design Patterns

About This Book

  • Learn all about abstract design patterns and how to implement them in Python 3
  • Understand the structural, creational, and behavioral Python design patterns
  • Get to know the context and application of design patterns to solve real-world problems in software...
Data Compression: The Complete Reference
Data Compression: The Complete Reference
Data compression is one of the most important techniques in computing engineering. From archiving data to CD-ROMs and from coding theory to image analysis, many facets of computing make use of data compression in one form or another. This book is intended to provide an overview of the many different types of compression: it includes a taxonomy, an...
Knowledge-Based Neurocomputing
Knowledge-Based Neurocomputing
Neurocomputing methods are loosely based on a model of the brain as a network of simple interconnected processing elements corresponding to neurons. These methods derive their power from the collective processing of artificial neurons, the chief advantage being that such systems can learn and adapt to a changing environment. In knowledge-based...
Making Sense of Data: Designing Effective Visualizations
Making Sense of Data: Designing Effective Visualizations

You have a mound of data sitting in front of you and a suite of computation tools at your disposal. And yet, you’re stumped as to how to turn that data into insight. Which part of that data actually matters, and where is this insight hidden?

If you’re a data scientist who struggles to navigate the murky space...

Mathematical Models of Spoken Language
Mathematical Models of Spoken Language
Humans use language to convey meaningful messages to each other. Linguistic competence consists in the ability to express meaning reliably, not simply to obtain faithful lexical transcriptions. This invaluable reference tool is the product of many years' experience and research on language and speech technology. It presents the motivations for,...
Quality of Telephone-Based Spoken Dialogue Systems
Quality of Telephone-Based Spoken Dialogue Systems
An increasing number of telephone services are offered in a fully automatic way with the help of speech technology. The underlying systems, called spoken dialogue systems (SDSs), possess speech recognition, speech understanding, dialogue management, and speech generation capabilities, and enable a more-or-less natural spoken interaction with the...
Mites: Ecology, Evolution & Behaviour: Life at a Microscale
Mites: Ecology, Evolution & Behaviour: Life at a Microscale

More than 40,000 species of mites have been described, and up to 1 million may exist on earth. These tiny arachnids play many ecological roles including acting as vectors of disease, vital players in soil formation, and important agents of biological control. But despite the grand diversity of mites, even trained biologists are often unaware...

Coverage Control in Sensor Networks (Computer Communications and Networks)
Coverage Control in Sensor Networks (Computer Communications and Networks)

This easy-to-read text focuses on challenges in coverage control in sensor networks, examines fundamental coverage problems, and presents the most recent advances and techniques in the field. Features: provides an introduction to sensors, sensor nodes, sensor networks, and sensor coverage models; supplies an informal definition and taxonomy for...

The Inmates Are Running the Asylum : Why High Tech Products Drive Us Crazy and How to Restore the Sanity (2nd Edition)
The Inmates Are Running the Asylum : Why High Tech Products Drive Us Crazy and How to Restore the Sanity (2nd Edition)
The Inmates are Running the Asylum argues that, despite appearances, business executives are simply not the ones in control of the high-tech industry. They have inadvertently put programmers and engineers in charge, leading to products and processes that waste huge amounts of money, squander customer loyalty, and erode competitive advantage. They...
Security for Multihop Wireless Networks
Security for Multihop Wireless Networks

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area...

Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Learn the fundamental algorithms and protocols for wireless and mobile ad hoc networks

Advances in wireless networking and mobile communication technologies, coupled with the proliferation of portable computers, have led to development efforts for wireless and mobile ad hoc networks. This book focuses on several aspects of wireless ad hoc...

Result Page: 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy