|
|
|
|
Simulating Fuzzy SystemsSimulating Fuzzy Systems demonstrates how many systems naturally become fuzzy systems and shows how regular (crisp) simulation can be used to estimate the alpha-cuts of the fuzzy numbers used to analyze the behavior of the fuzzy system. This monograph presents a concise introduction to fuzzy sets, fuzzy logic, fuzzy estimation,... | | Brute Force: Cracking the Data Encryption StandardIn the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved... | | |
|
| | 365 Steps to Self-Confidence: A Program for Personal Transformation"'I've spent hundreds of pounds on books over the last few years, but yours is worth a dozen of my collection.' Personal Development Trainer, Ireland; 'Follow the 52 themed chapters, including exercises, insights and practical hints on how to overcome your lack of self-esteem and begin to live life to the full Now, not tomorrow!' Good... | | Mast Cells: Methods and Protocols (Methods in Molecular Biology)
A cutting-edge collection of readily reproducible techniques for the isolation, culture, and study of activation and signaling in human mast cells. These methods take advantage of the latest advances in molecular biology, technology, and information science. They include methods for the identification of mast cells, the development of mast... |
|
|
|
|
Result Page: Previous 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 Next |