508 pages, October, 2015
In this book, we can read about new technologies that enhance training and performance; discover new, exciting ways to design and deliver content; and have access to proven strategies, practices and solutions shared by experts. The authors of this bo ...
Victor (Wai Kin) Chan
284 pages, March, 2013
The purpose of this book is to introduce researchers and practitioners to recent advances and applications of Monte Carlo Simulation (MCS). Random sampling is the key of the MCS technique. The 11 chapters of this book collectively illustrates how suc ...
Pei-Gee Peter Ho
126 pages, October, 2012
The field of digital image segmentation is continually evolving. Most recently, the advanced segmentation methods such as Template Matching, Spatial and Temporal ARMA Processes, Mean Shift Iterative Algorithm, Constrained Compound Markov Random Field ...
Vasilios N. Katsikis
324 pages, September, 2012
This excellent book represents the second part of three-volumes regarding MATLAB- based applications in almost every branch of science. The present textbook contains a collection of 13 exceptional articles. In particular, the book consists of three s ...
400 pages, September, 2012
Advances in Data Mining Knowledge Discovery and Applications aims to help data miners, researchers, scholars, and PhD students who wish to apply data mining techniques. The primary contribution of this book is highlighting frontier fields and impleme ...
336 pages, August, 2012
Data Mining Applications in Engineering and Medicine targets to help data miners who wish to apply different data mining techniques. Data mining generally covers areas of statistics, machine learning, data management and databases, pattern recognitio ...
236 pages, July, 2012
The book is a new edition of stereo vision book series of INTECH Open Access Publisher and it presents diverse range of ideas and applications highlighting current research/technology trends and advances in the field of stereo vision. The topics cove ...
234 pages, May, 2012
Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an i ...