Search

Search Results

Results 121-130 of 800 (Search time: 0.132 seconds).
Item hits:
  • Sách/Book


  • Authors: Joseph Migga Kizza (2005)

  • A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practi...

  • Sách/Book


  • Authors: Dharma Prakash Agrawal (2017)

  • The book discusses the need for synchronization and underlying limitations, the interrelation between given coverage and connectivity to the number of sensors needed, and the use of geometrical distance to determine the location of the base station for data collection, while also exploring the use of anchor nodes to determine the relative positions of sensors

  • Sách/Book


  • Authors: Byte Craft Limited (2002)

  • This book is intended to fill the need for an intermediate level overview of programming microcontrollers using the C programming language. It will be useful both as an introduction to microcontroller programming for intermediate level post-secondary programs and as a guide for developers coping with the growth and change of the microcontroller industry.

  • Sách/Book


  • Authors: Joan Lambert (2013)

  • Demonstrate your expertise with Microsoft Office! Designed to help you practice and prepare for the 2013 Excel Microsoft Office Specialist (MOS) exam, this all-in-one study guide features: Full, objective-by-objective exam coverage Easy-to-follow procedures and illustrations to review essential skills Hands-on practice tasks to apply what you've learned Includes downloadable practice files

  • Sách/Book


  • Authors: Vojislav Kecman (2021)

  • This textbook provides a thorough introduction to the field of learning from experimental data and soft computing. Support vector machines (SVM) and neural networks (NN) are the mathematical structures, or models, that underlie learning, while fuzzy logic systems (FLS) enable us to embed structured human knowledge into workable algorithms. The book assumes that it is not only useful, but necessary, to treat SVM, NN, and FLS as parts of a connected whole. Throughout, the theory and algorithms are illustrated by practical examples, as well as by problem sets and simulated experiments. This approach enables the reader to develop SVM, NN, and FLS in addition to understanding them. The book also presents three case studies: on NN-based control, financial time series analysis, and compute...

  • Sách/Book


  • Authors: Kiyofumi Tanaka (2012)

  • Nowadays, embedded systems have permeated various aspects of industry. Therefore, we can hardly discuss our life or society from now on without referring to embedded systems. For wide-ranging embedded systems to continue their growth, a number of high-quality fundamental and applied researches are indispensable. This book addresses a wide spectrum of research topics on embedded systems, including basic researches, theoretical studies, and practical work.

  • Sách/Book


  • Authors: David Hand (2001)

  • The book consists of three sections. The first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are constructed to solve specific problems in a principled manner. The algorithms covered include trees and rules for classification and regression, association rules, belief networks, classical statistical models, nonlinear models such as neural networks, and local "memory-based" models. The third section shows how all of the preceding analysis fits together when applied to real-world data mining problems. Topics include the role of metadata, how to handle missing data, and data preprocessing..