Home | Amazing | Today | Tags | Publishers | Years | Search 
A Primer of Signal Detection Theory
A Primer of Signal Detection Theory
Signal Detection Theory (SDT) has had, and continues to have, an
enormous impact on many branches of psychology. Although its initial
applications were in the interpretation of sensory processes, its domain
has since widened considerably. For example, concepts derived
from SDT are widely used in memory research and in studies of
...
Tropical and Parasitic Infections in the Intensive Care Unit (Perspectives on Critical Care Infectious Diseases)
Tropical and Parasitic Infections in the Intensive Care Unit (Perspectives on Critical Care Infectious Diseases)
The term tropical infection is most commonly used to describe an
infection occurring in an individual living in the geographical area
between the Tropic of Cancer and the Tropic of Capricorn. Both
developing and developed countries fall within these equatorial
parallels. It is said that the common feature that allows the
...
Using Investor Relations to Maximize Equity Valuation
Using Investor Relations to Maximize Equity Valuation
A practical guide to proactive investor relations (IR)
Investor relations (IR) has traditionally been an administrative function within corporate communications, responsible for disseminating public information and answering investor and media questions. Using Investor Relations to Maximize Equity Valuation challenges this approach, by
...
New Developments in Categorical Data Analysis for the Social & Behavioral Science
New Developments in Categorical Data Analysis for the Social & Behavioral Science
Almost all research in the social and behavioral sciences, and also in economic and marketing research, criminological research, and social medical research deals with the analysis of categorical data. Categorical data are quantified as either nominal or ordinal variables. This volume is a collection of up-to-date studies on modern categorical data...
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

Quality of Telephone-Based Spoken Dialogue Systems
Quality of Telephone-Based Spoken Dialogue Systems
An increasing number of telephone services are offered in a fully automatic way with the help of speech technology. The underlying systems, called spoken dialogue systems (SDSs), possess speech recognition, speech understanding, dialogue management, and speech generation capabilities, and enable a more-or-less natural spoken interaction with the...
Computer Vision Beyond the Visible Spectrum (Advances in Pattern Recognition)
Computer Vision Beyond the Visible Spectrum (Advances in Pattern Recognition)
Recently, there has been a dramatic increase in the use of sensors in the non-visible bands. As a result, there is a need for existing computer vision methods and algorithms to be adapted for use with non-visible sensors, or for the development of completely new methods and systems. Computer Vision Beyond the Visible Spectrum is...
Millimeter-Wave Integrated Circuits
Millimeter-Wave Integrated Circuits
Millimeter-Wave Integrated Circuits delivers a detailed overview of MMIC design, specifically focusing on designs for the millimeter-wave (mm-wave) frequency range. The scope of the book is broad, spanning detailed discussions of high-frequency materials and technologies, high-frequency devices, and the design of high-frequency...
Artificial Intelligence: A Guide to Intelligent Systems (2nd Edition)
Artificial Intelligence: A Guide to Intelligent Systems (2nd Edition)
Provides a practical introduction to artificial intelligence that is less mathematically rigorous than other books on the market. Appropriate for programmers looking for an overview of all facets of artificial intelligence.

[Shelving Category] Artificial Intelligence/Soft Computing

Artificial Intelligence is often perceived...

Going Mod: 9 Cool Case Mod Projects
Going Mod: 9 Cool Case Mod Projects
You're about to come down with a case of mod

Face it—you're just not a boring beige box person. If you were, you'd never have picked up this book. So if you've even fantasized about making your computer case scream "cool," don't put it down. Part I shows you the tools you need and how to use them. Part II frees your creativity,...

Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
"Thought-provoking and far-sighted, this book provides a detailed analysis of the legal issues involved in on-line business and how a new generation of electronic agents can help. If you’re grappling with these issues today—or if you just want to see what’s coming tomorrow—this book is an excellent place to...
From Bash to Z Shell: Conquering the Command Line
From Bash to Z Shell: Conquering the Command Line

A shell is a sophisticated way to control your computer—Unix, Linux, Microsoft Windows, Mac OS X, and others. If you do more than the most basic operations, you can do many of them more powerfully and quickly with a shell and your keyboard than by using a mouse.

The history of shells goes back some 30 years. In the early...

Result Page: Previous 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy