Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Knowledge in Formation: A Computational Theory of Interpretation (Cognitive Technologies)
Knowledge in Formation: A Computational Theory of Interpretation (Cognitive Technologies)

With knowledge representation we face more or less the same problem as Augustine (354–430) when thinking about time: if nobody asks what it is, it seems clear enough, but being asked it proves to be very difficult to provide an answer.

At the beginning of our research we thought that a solution for the problem of...

Intelligent Complex Adaptive Systems
Intelligent Complex Adaptive Systems
I don’t believe in the existence of a complex systems theory as such and, so far, I’m still referring to complex systems science (CSS) in order to describe my research endeavours. In my view, the latter is constituted, up until now, by a bundle of loosely connected methods and theories aiming to observe— from...
Syntactic Pattern Recognition: An Introduction (Applied Mathematics and Computation; No. 14)
Syntactic Pattern Recognition: An Introduction (Applied Mathematics and Computation; No. 14)
This book was written to provide students, engineers, and scientists involved in pattern recognition, digital image processing, and artificial intelligence with a comprehensive introduction to the concepts and tech- niques of syntactic pattern recognition.

Syntactic pattern recognition is concerned with the
...
Digital Filters and Signal Processing in Electronic Engineering: Theory, Applications, Architecture, Code (Woodhead Publishing Series in Optical and Electronic Materials)
Digital Filters and Signal Processing in Electronic Engineering: Theory, Applications, Architecture, Code (Woodhead Publishing Series in Optical and Electronic Materials)
From industrial and teaching experience the authors provide a blend of theory and practice of digital signal processing (DSP) for advanced undergraduate and post-graduate engineers reading electronics. This fast-moving, developing area is driven by the information technology revolution. It is a source book in research and development for...
The Practice of Macro Social Work
The Practice of Macro Social Work

Intended for those who want to make a difference in today's modern society, this comprehensive book explores the theory and methods in nine arenas of macro social work at the community, organizational, societal, and global levels of practice. THE PRACTICE OF MACRO SOCIAL WORK, Fourth Edition, challenges readers to use their concern,...

Architectural Theory: Volume I - An Anthology from Vitruvius to 1870
Architectural Theory: Volume I - An Anthology from Vitruvius to 1870

"Architectural Theory: Vitruvius to 1870" is a landmark anthology that surveys the development of the field of architecture from its earliest days to the year 1870. The first truly comprehensive anthology that brings together the classic essays in the field, the volume chronicles the major developments and trends in architecture...

Mastering Structured Data on the Semantic Web: From HTML5 Microdata to Linked Open Data
Mastering Structured Data on the Semantic Web: From HTML5 Microdata to Linked Open Data

A major limitation of conventional web sites is their unorganized and isolated contents, which is created mainly for human consumption. This limitation can be addressed by organizing and publishing data, using powerful formats that add structure and meaning to the content of web pages and link related data to one another. Computers can...

Terrorism: The Basics
Terrorism: The Basics

Terrorism: The Basics is an ideal starting point for anyone interested in one of the most discussed, written about and analysed aspects of modern life. Common misconceptions are dispelled as the authors provide clear and jargon-free answers to the big questions:

  • What does terrorism involve?
  • ...
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Digital Image Processing: PIKS Inside, Third Edition.
Digital Image Processing: PIKS Inside, Third Edition.
The book is intended to be an “industrial strength” introduction to digital image
processing to be used as a text for an electrical engineering or computer science
course in the subject. Also, it can be used as a reference manual for scientists who
are engaged in image processing research, developers of image processing
...
How to Cheat at Managing Information Security
How to Cheat at Managing Information Security
Information security is different from many other disciplines both within mainstream
information technology and other business areas. Even though there are
now many good books on various areas, getting the breadth of knowledge
across the many subareas is still difficult, but it is essential to success.

Unlike so many
...
unlimited object storage image
Result Page: 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 322 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy