This splendid illustrated exploration of masks and masking ceremonies from the Democratic Republic of the Congo presents more than 130 outstanding wooden masks dating from the 18th to the 20th ce
This book will provide an introduction to machine learning, fuzzy systems and evolutionary algorithms for senior undergraduate students at universities and colleges as well as for practitioners. The t
Generative design, once known only to insiders as a revolutionary method of creating artwork, models, and animations with programmed algorithms, has in recent years become a popular tool for designers
5G Networks: Planning, Design and Optimization presents practical methods and algorithms for the design of 5G Networks, covering issues ranging from network resilience to how Big Data analytics can us
This book presents real-world problems and pioneering research that reflect novel approaches to cybernetics, algorithms and software engineering in the context of intelligent systems. It gathers the p
Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become
Coding means creating a set of instructions (or algorithms) that tells a computer how to perform a task. Another word for coding is ‘programming’. Learn about the origins of coding, how it is done and
This fully revised and updated new edition of the definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms
Dating back to the nineteenth-century transplantation of a latex-producing tree from the Amazon to Southeast Asia, rubber production has wrought monumental changes worldwide. During a turbulent Vietna
The modern world is a tough place for the thinking man. Between the strain of making dating small talk, the pitfalls of business networking and the expectation that he will be widely informed and arti
This book describes a set of tools and algorithms then enable the electrical engineer in fields such as circuit design, power delivery, signal integrity, analog design, package and board modeling to a
This book highlights some of the unique aspects of spatio-temporal graph data from the perspectives of modeling and developing scalable algorithms. The authors discuss in the first part of this book,
When Baltimore Detectives Lisa Swanson and Winston Lewis discover a sexually explicit profile of Dee Quarter on an online dating site, they are horrified. Dee swears the profile is fake and has no ide
This book offers comprehensive information on the theory, models and algorithms involved in state-of-the-art multivariate time series analysis and highlights several of the latest research advances in
A construction project beneath the National Mall reveals a dark secret dating back to the Civil War, something buried by a cabal of scientists, led by Alexander Graham Bell, who helped found the Smith
Domestic violence affects a broad range amongst society today with 19% of college females experiencing some type of dating violence. These facts may be new to some but those who are survivors of dome
In this irresistible new novel by Mary Ann Marlowe, one woman’s up-close and sexy encounter with a tabloid sensation reveals the dizzying—and delicious—dilemma of dating in the spotlight . . . Celeb
Machine Learning: A Constraint-Based Approach provides readers with a refreshing look at the basic models and algorithms of machine learning, with an emphasis on current topics of interest that includ
This stunning selection of color views, dating from the period 1953-1980, includes most of the vessels operated during this period by the Isle of Man Steam Packet Company and The Ramsey Steamship Comp
This book offers a social–scientific interpretation of the Hindu and Buddhist traditions of Tantra dating back 15 centuries. It is a self-reflexive study approached with an insider’s empathy and the p
This third edition covers fundamental concepts in creating and manipulating 2D and 3D graphical objects, including topics from classic graphics algorithms to color and shading models. It maintains the
A Navy SEAL’s life isn’t all deadly missions. Commandos need love too. But when Naval Special Warfare computer guru Will Weber puts the fate of his love life in the combined hands of a dating app and
This book highlights the application of Geographical Information System (GIS) and nature based algorithms to solve the problems of water and water based renewable energy resources. The irregularity in
Marriage is in this playbook! Football champion Ethan Ladd planned to spend the off-season dating beautiful women and living the good life. Until his ailing infant nephew is thrust into his care.
This book discusses new approaches and methods in the cybernetics, algorithms and software engineering in the scope of the intelligent systems. It brings new approaches and methods to real-world probl
This book provides a thorough treatment of the performance modeling strategies and control algorithms required for the design and use of information-gathering autonomous agents comprised of unmanned v
Until now, no other book examined the gap between the theory of algorithms and the production of software programs. Focusing on practical issues, A Programmer's Companion to Algorithm Analysis careful
Everything seems to be going perfectly for Maya Davis: She has a great job at a coffee shop, gets along with her parents, and is happily single. That is until her best friend starts dating Maya’s high
What can flame-throwing squirrels tell us about human emotion? Can social media empower political activism? How has the Internet changed the way we form our identities? Do algorithms have a social rol
What can flame-throwing squirrels tell us about human emotion? Can social media empower political activism? How has the Internet changed the way we form our identities? Do algorithms have a social rol
During his presidency, Jimmy Carter received a comprehensive analysis of his family’s genealogy, dating back 12 generations, from leaders of the Mormon Church. More recently Carter’s son Jeff took ove
Benoît de Sainte-Maure's Roman de Troie, dating to around 1165, is, along with the Roman de Thèbes and the Roman d'Eneas, one of the three "romances of antiquity" (romans d'antiquité).
(Boosey & Hawkes Scores/Books). Britten's arrangements of Schubert's The Trout (op 32/D550) for small orchestra, and Schumann's Spring Night (op 39 no 12) for chamber orchestra, dating from 1942, are
There are a number of books on computational intelligence (CI), but they tend to cover a broad range of CI paradigms and algorithms rather than provide an in-depth exploration in learning and adaptive
Aisha Williams had been there, done it and seen it all when it came to dating men. But when she began to fall for handsome pastor Daniel Lancaster she felt like he was different. He was the first whi
Greek and Latin Narratives about the Ancient Martyrs provides a collection, with facing-page translations, of Greek and Latin Christian martyr narratives dating from the first four centuries CE. While
This book gives a reasonably self-contained account of a number of algorithmic problems and their solutions for linear algebraic groups. The theory underpinning the algorithms is described as well. To
EXCERPT There was one guy we didn't invite to the orgy. We invited everyone else: Solaire because she's crazy and John and Walt because they're both so good-looking and they're dating anyway, and we
With the proliferation of mobile devices and hearing devices, including hearing aids and cochlear implants, there is a growing and pressing need to design algorithms that can improve speech intelligib
Although we now have sophisticated algorithms and techniques for determining the shapes and sizes and for matching the fit between shoes and feet, few, if any, of the books currently available cover t