الكتب الالكترونية

عدد الكتب: 661 - 676 /676
978-3-540-31544-5
Tutorials in Mathematical Biosciences I

This volume introduces some basic theories on computational neuroscience. Chapter 1 is a brief introduction to neurons, tailored ...

اقرأ المزيد
978-3-540-76284-3
Type-2 Fuzzy Logic: Theory and Applications

This book describes new methods for building intelligent systems using type-2 fuzzy logic and soft computing techniques. ...

اقرأ المزيد
978-0-387-75523-6
Unifying Perspectives in Computational and Robot Vision

The field of computer vision has developed significantly over the last several years and the application areas span a broad ...

اقرأ المزيد
978-0-387-77152-6
Urban Transportation Planning in the United States

The book focuses in-depth at the most significant event in transportation planning--the Federal-Aid Highway Act of 1962; ...

اقرأ المزيد
978-0-387-78632-2
VEGF in Development

This book is devoted to vascular endothelial growth factor A (VEGF or VEGFA), a secreted signalling protein of great significance ...

اقرأ المزيد
978-3-030-05819-7
VR Technologies in Cultural Heritage

Tthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...

اقرأ المزيد
978-3-540-70872-8
Verbal and Nonverbal Features of Human-Human and Human-Machine Interaction : COST Action 2102 International Conference, Patras, Greece, October 29-31, 2007. Revised Papers

This book is organized in topical sections on static and dynamic processing of faces, facial expressions and gaze as well ...

اقرأ المزيد
978-3-540-71080-6
Visual Data Mining : Theory, Techniques and Tools for Visual Analytics

The volume is structured in three parts on theory and methodologies, techniques, and tools and applications.

اقرأ المزيد
978-3-540-85933-8
Visualization for Computer Security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.

اقرأ المزيد
978-3-540-78243-8
VizSEC 2007 : Proceedings of the Workshop on Visualization for Computer Security

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...

اقرأ المزيد
978-981-13-6779-3
Vote Buying in Indonesia

This book presents a pathbreaking analysis of vote-buying in Indonesia. Drawing on a stunning array of evidence, Muhtadi ...

اقرأ المزيد
978-0-387-23322-2
Water Quality Hazards and Dispersion of Pollutants

Water resources are under stress worldwide and one of the elements of this stress - man's impact on water quality constitutes ...

اقرأ المزيد
978-3-540-37882-2
Web Data Mining

Web mining aims to discover u- ful information or knowledge from Web hyperlinks, page contents, and - age logs. Based on ...

اقرأ المزيد
978-3-540-89903-7
Web and Wireless Geographical Information Systems : 8th International Symposium, W2GIS 2008, Shanghai, China, December 11-12, 2008. Proceedings

This book includs but not limited to Conceptual and logical models, Data management and retrieval, Geographical search engines, ...

اقرأ المزيد
978-1-4020-9135-3
Who Owns the Moon? : Extraterrestrial Aspects of Land and Mineral Resources Ownership

This work investigates the permissibility and viability of property rights on the celestial bodies, particularly the extraterrestrial ...

اقرأ المزيد
NoIMG
Working, Housing: Urbanizing : The International Year of Global Understanding - IYGU

This book presents an incisive outline of the historical development and geography of cities. It focuses on three themes ...

اقرأ المزيد
عدد الكتب: 661 - 676 /676