We describe in this book, new methods for intelligent pattern recognition using soft computing techniques. Soft Computing (SC) consists of several computing paradigms, including fuzzy logic, neural networks, and genetic algorithms, which can be used to produce powerful hybrid intelligent systems for pattern recognition. Hybrid intelligent systems...
Information extraction regards the processes of structuring and combining content that is explicitly stated or implied in one or multiple unstructured information sources. It involves a semantic classification and linking of certain pieces of information and is considered as a light form of content understanding by the machine. Currently, there is...
This comprehensive book covers the strategy, tactics, and processes needed for successful project portfolio management. It outlines a road map to unprecedented project management improvement and includes a detailed implementation plan for both strategic planning and a PMO that gives you measurable results in weeks. The author delineates four...
"As you might expect, there are plenty of UML diagrams. Real-time UML specifications are used throughout, consistent with the purpose of the book. Designers with UML expertise who want to understand how to address real-time applications will find this book useful, as will those in the real-time world who need to understand how to bring UML...
"Extensive, exhaustive, complete...Half the terms I didn't know! Every studio exec, director, producer, student and journalist should read this book cover to cover!" Scott Ross, Co-Founder/CEO, Digital Domain
"An indispensable tool for anyone working in the visual effects medium today." Marty Cohen, Post...
This book reviews the status of a very exciting field -- neutrino oscillations -- at a very important time. The fact that neutrinos have mass has only been proved in the last few years and the acceptance of that fact has opened up a whole new area of study to understand the fundamental parameters of the mixing matrix.
Before you start your hacking projects, you'll need the right arsenal of tools. For some hacks, you might need only a single screwdriver. For others, you could need a workshop complete with power tools and advanced electronic equipment. For the most part, it isn't necessary to have a world-class laboratory or top-of-the-line computer system to...
Linux Kernel Module Programming Guide is for people who want to write kernel modules. It takes a hands-on approach starting with writing a small "hello, world" program, and quickly moves from there. Far from a boring text on programming, Linux Kernel Module Programming Guide has a lively style that entertains while it educates. An...
The MCTS is Windows Server Virtualization Configuring exam, and is Microsoft?s newest addition to their exam repertoire and tests candidates? ability to use Hyper-V and server virtualization as part of their network infrastructure solution. The exam targets IT professionals who are looking to enhance their skills and distinguish themselves...
Translate broadband wireless mumbo-jumbo into clear business terms
No guide tackles and clarifies the chaotic acronym-ridden world of broadband wireless better than Wireless Broadband Handbook. Best-selling telecom author Regis "Bud" Bates has the formula to give you the "instant expertise" you need to compete and...
“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...
Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...