Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fusion of Neural Networks, Fuzzy Systems and Genetic Algorithms: Industrial Applications
Fusion of Neural Networks, Fuzzy Systems and Genetic Algorithms: Industrial Applications
Artificial neural networks can mimic the biological information-processing mechanism in - a very limited sense. Fuzzy logic provides a basis for representing uncertain and imprecise knowledge and forms a basis for human reasoning. Neural networks display genuine promise in solving problems, but a definitive theoretical basis does not yet exist for...
The Algorithm Design Manual
The Algorithm Design Manual
Most of the professional programmers that I've encountered are not well prepared to tackle algorithm
design problems. This is a pity, because the techniques of algorithm design form one of the core practical
technologies of computer science. Designing correct, efficient, and implementable algorithms for realworld
problems is a tricky
...
Introduction to Power Electronics (Essential Electronics Series)
Introduction to Power Electronics (Essential Electronics Series)
Building on solid state device and electromagnetic contributions to the series, this text book introduces modern power electronics, that is the application of semiconductor devices to the control and conversion of electrical power. The increased availability of solid state power switches has created a very rapid expansion in applications, from the...
Calculus for the Utterly Confused
Calculus for the Utterly Confused

When it comes to understanding one of your most intimidating courses--calculus--even good students can be confused. Intended primarily for the non-engineering calculus student (though the more serious calculus student will also benefit), Calculus for the Utterly Confused is your ticket to success. Calculus concepts are explained and applied...

Java Security (Java Series)
Java Security (Java Series)

Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with...

Learning the vi Editor (6th Edition)
Learning the vi Editor (6th Edition)
For many users, working in the Unix environment means using vi, a full-screen text editor available on most Unix systems. Even those who know vi often make use of only a small number of its features.

Learning the vi Editor is a complete guide to text editing with
vi. Topics new to the sixth
...
Handbook of Integral Equations
Handbook of Integral Equations
Integral equations are encountered in various fields of science and numerous applications (in elasticity, plasticity, heat and mass transfer, oscillation theory, fluid dynamics, filtration theory, electrostatics, electrodynamics, biomechanics, game theory, control, queuing theory, electrical engineering, economics, medicine, etc.).

Exact
...
Schaum's Outline of Trigonometry
Schaum's Outline of Trigonometry
In revising the second edition, the strengths of the prior editions were retained while reflecting the changes in the study of trigonometry during the last ten years. This edition deletes the use of logarithms entirely, increases the use of calculators, and changes from the column form of working identity problems to the horizontal...
Matrix Algorithms, Volume I
Matrix Algorithms, Volume I
This book, Basic Decompositions, is the first volume in a projected five-volume series entitled Matrix Algorithms. The other four volumes will treat eigensystems, iterative methods for linear systems, sparse direct methods, and special topics, including fast algorithms for structured matrices.

My intended audience is the nonspecialist
...
Computational Geometry in C Second Edition (Cambridge Tracts in Theoretical Computer Science (Paperback))
Computational Geometry in C Second Edition (Cambridge Tracts in Theoretical Computer Science (Paperback))
This is the newly revised and expanded edition of the popular introduction to the design and implementation of geometry algorithms arising in areas such as computer graphics, robotics, and engineering design. The second edition contains material on several new topics, such as randomized algorithms for polygon triangulation, planar point...
DNS and BIND
DNS and BIND
You may not know much about the Domain Name System − yet − but whenever you use the Internet, you
use DNS. Every time you send electronic mail or surf the World Wide Web, you rely on the Domain Name
System.

You see, while you, as a human being, prefer to remember the names of computers, computers like to address...
Schaum's Outline of Digital Signal Processing (Schaum's)
Schaum's Outline of Digital Signal Processing (Schaum's)

Master digital signal processing with Schaum's­­the high-performance study guide. It will help you cut down on study time, hone problem-solving skills, and achieve your personal best on exams. Students love Schaum's Outlines because they produce results. Each year, hundreds of thousands of students improve their test scores and final...

Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy