You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Buku "Perangkat Lunak Data Mining" menyajikan teknik dan alat yang digunakan dalam penggalian data untuk membantu pengambil keputusan memahami serta memanfaatkan data dalam cara yang paling efektif. Dengan struktur ini, dapat menambah wawasan tentang bagaimana perangkat lunak data mining beroperasi dan bagaimana memaksimalkannya untuk berbagai aplikasi analitis. Buku ini menjelaskan konsep dasar data mining serta pentingnya perangkat lunak dalam proses pengumpulan dan pra-pemrosesan data. Pembaca akan diajak untuk memahami arsitektur perangkat lunak yang umum digunakan, termasuk berbagai metode dan algoritma yang menjadi andalan, seperti Decision Trees, Random Forest, Support Vector Machines...
Developed by the authors, generalized structured component analysis is an alternative to two longstanding approaches to structural equation modeling: covariance structure analysis and partial least squares path modeling. Generalized structured component analysis allows researchers to evaluate the adequacy of a model as a whole, compare a model to alternative specifications, and conduct complex analyses in a straightforward manner. Generalized Structured Component Analysis: A Component-Based Approach to Structural Equation Modeling provides a detailed account of this novel statistical methodology and its various extensions. The authors present the theoretical underpinnings of generalized stru...
Data Analytics and Big Data, Electrical, Information System Management, IT Infrastructure and Security, Telecommunication
As a developer new to Web Services, how do you make sense of this emerging framework so you can start writing your own services today? This concise book gives programmers both a concrete introduction and a handy reference to XML web services, first by explaining the foundations of this new breed of distributed services, and then by demonstrating quick ways to create services with open-source Java tools.Web Services make it possible for diverse applications to discover each other and exchange data seamlessly via the Internet. For instance, programs written in Java and running on Solaris can find and call code written in C# that run on Windows XP, or programs written in Perl that run on Linux,...
"Electronic noses" are instruments which mimic the sense of smell. Consisting of olfactory sensors and a suitable signal processing unit, they are able to detect and distinguish odors precisely and at low cost. This makes them very useful for a remarkable variety of applications in the food and pharmaceutical industry, in environmental control or clinical diagnostics and more. The scope covers biological and technical fundamentals and up-to-date research. Contributions by renowned international scientists as well as application-oriented news from successful "e-nose" manufacturers give a well-rounded account of the topic, and this coverage from R&D to applications makes this book a must-have read for e-nose researchers, designers and users alike.
Estimators need to understand the consequences of entering into a contract, often defined by complex conditions and documents, as well as to appreciate the technical requirements of the project. Estimating and Tendering for Construction Work, 5th edition, explains the job of the estimator through every stage, from early cost studies to the creation of budgets for successful tenders. This new edition reflects recent developments in the field and covers: new tendering and procurement methods the move from basic estimating to cost-planning and the greater emphasis placed on partnering and collaborative working the New Rules of Measurement (NRM1 and 2), and examines ways in which practicing esti...
The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations. Ensuring the information transmission over the Internet is safe and secure has become crucial, consequently information security has become one of the most important issues of human communities because of increased data transmission over social networks. Digital Media Steganography: Principles, Algorithms, and Advances covers fundamental theories and algorithms for practical design, while providing a comprehensive overview of the most advanced methodologies and modern techniques in the field of stegano...
"It is a pleasure to recommend this book as a major contribution to our practical understanding of the Evolutionary Delivery project management method. It is rich with insights and practical advice which should help the practicing manager, as well as the intitial student of the method." Tom Gilb, Author of "Principles of Software Engineering Management". Software Projects Evolutionary vs. Big-Bang Delivery Producers of off-the-shelf software do not have the luxury of making phased deliveries to their customers. Increasingly, however, they manage the development process in an evolutionary manner — often with only limited success. In the development of large bespoke systems, the relationship...
In Project Management: Achieving the Bottom Line Succe$$ author William J. Pinkerton explains the strategic thinking, planning, development, and testing processes that must take place to ensure a project's success--and necessity--before it's even approved. Successfully utilized in workshops throughout the USA, Canada, and Southeast Asia, this resource reveals how to: * Determine if projects are needed and how to make sure they succeed * Develop and execute projects that reflect corporate goals and objectives * Plan projects with an eye towards tangible bottom-line benefits and eliminate impulse thinking * Includes more than 125 tips for testing and recording project start-ups