Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
We describe in this book, bio-inspired models and applications of hybrid intelligent systems using soft computing techniques for image analysis and pattern recognition based on biometrics and other information sources. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks,...
Tropical Rainforests and Agroforests under Global Change: Ecological and Socio-economic Valuations
Tropical Rainforests and Agroforests under Global Change: Ecological and Socio-economic Valuations

Tropical rainforests are disappearing due to agricultural intensification and climate change, causing irreversible losses in biodiversity and associated ecosystem functioning. Ecosystem properties and human well-being are profoundly influenced by environmental change, which is often not considered during land use intensification....

DBA Survivor: Become a Rock Star DBA
DBA Survivor: Become a Rock Star DBA

You hold in your hands a collection of insight and wisdom on the topic of database administration gained through many years of hard-won experience, long nights of study, and direct mentorship under some of the industry’s most talented database professionals and information technology (IT) experts.

Consider the standard...

Access 2010: The Missing Manual
Access 2010: The Missing Manual

Go from Access novice to true master with the professional database design tips and crystal-clear explanations in this book. You'll learn all the secrets of this powerful database program so you can use your data in creative ways -- from creating product catalogs and publishing information online to producing invoices and...

Plone 3 Intranets
Plone 3 Intranets

Plone is widely used for creating feature-rich and secure enterprise intranets. Each company has different goals, architecture, hierarchy, and size and requires a very different intranet to manage its business. No matter what size, or what purpose, Plone offers solutions to the most common intranet needs, and more.

If you've...

Musical Performance: A Comprehensive Approach: Theory, Analytical Tools, and Case Studies
Musical Performance: A Comprehensive Approach: Theory, Analytical Tools, and Case Studies

This book is a first sketch of what the overall field of performance could look like as a modern scientific field but not its stylistically differentiated practice, pedagogy, and history. Musical performance is the most complex field of music. It comprises the study of a composition’s expression in terms of...

Replay: The History of Video Games
Replay: The History of Video Games

A riveting account of the birth and remarkable evolution of the most important development in entertainment since television, Replay: The History of Video Games is the ultimate history of video games. From its origins in the research labs of the 1940s to the groundbreaking success of the Wii, Replay sheds new light on gaming's past. Along...

Computational Vision and Medical Image Processing: Recent Trends
Computational Vision and Medical Image Processing: Recent Trends

Nowadays, computationalmethodologies of signal processing and imaging analysis for 2D, 3D and even 4D data are commonly used for various applications in society. For example, Computational Vision systems are progressively used for surveillance tasks, traffic analysis, recognition process, inspection purposes, human-machine interfaces, 3D...

Introduction to the Command Line (Second Edition): The Fat Free Guide to Unix and Linux Commands
Introduction to the Command Line (Second Edition): The Fat Free Guide to Unix and Linux Commands

The command line can be an intimidating and unforgiving environment. Unlike working in graphical environments, it's not entirely clear what commands one must execute in a terminal to accomplish a given task. Couple this with the fact that the command line does not prevent you from doing things that might cause irreparable damage to your...

User-Centered Agile Methods (Synthesis Lectures on Human-Centered Informatics)
User-Centered Agile Methods (Synthesis Lectures on Human-Centered Informatics)
Agile methods have transformed how developers think about organizing the development of a project. Rather than months (or years) of development, followed by months of field test leading up to a release, agile methods organize development into short iterations with continuous testing and a flexible release date. The agile approach...
Twitter Tips, Tricks, and Tweets
Twitter Tips, Tricks, and Tweets
When I wrote the first edition of this book, Twitter was just starting to hit the big time: bemused front page articles in just about every magazine and newspaper in the land wondered just what this Twitter thing was all about; the actor Ashton Kutcher (@aplusk) had just cracked the one million follower mark; and Oprah herself had...
Mathematics for Informatics and Computer Science (ISTE)
Mathematics for Informatics and Computer Science (ISTE)

How many ways do exist to mix different ingredients, how many chances to win a gambling game, how many possible paths going from one place to another in a network ? To this kind of questions Mathematics applied to computer gives a stimulating and exhaustive answer. This text, presented in three parts (Combinatorics, Probability, Graphs)...

unlimited object storage image
Result Page: Previous 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy