Computer tips

Xem 1-20 trên 319 kết quả Computer tips
  • Tham khảo sách 'genetic computer school final project: knowledge base system - book 1 - user guide', công nghệ thông tin, cơ sở dữ liệu phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    doc67p anhtu 06-03-2009 184 33   Download

  • Tham khảo sách 'genetic computer school final project: knowledge base system - book 2 - system guide', công nghệ thông tin, tin học văn phòng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    doc83p anhtu 06-03-2009 143 21   Download

  • Face plays an important role in human communication. Facial expressions and gestures incorporate nonverbal information which contributes to human communication. By recognizing the facial expressions from facial images, a number of applications in the field of human computer interaction can be facilitated. Last two decades, the developments, as well as the prospects in the field of multimedia signal processing have attracted the attention of many computer vision researchers to concentrate in the problems of the facial expression recognition....

    pdf452p bi_bi1 11-07-2012 60 16   Download

  • This book presents several recent advances on Evolutionary Computation, specially evolution-based optimization methods and hybrid algorithms for several applications, from optimization and learning to pattern recognition and bioinformatics. Concerning evolutionbased optimization methods, this book presents diverse versions of genetic algorithms, genetic programming, and performance studies and analyses, as well as several particle swarm optimizers and hybrid approaches using neural networks and artificial immunological systems for multi-objective optimization....

    pdf0p bi_bi1 11-07-2012 67 16   Download

  • Evolutionary computation has been widely used in computer science for decades. Even though it started as far back as the 1960s with simulated evolution, the subject is still evolving. During this time, new metaheuristic optimization approaches, like evolutionary algorithms, genetic algorithms, swarm intelligence, etc., were being developed and new fields of usage in artificial intelligence, machine learning, combinatorial and numerical optimization, etc., were being explored.

    pdf326p bi_bi1 11-07-2012 45 14   Download

  • This book has a unique title” Advances in Computer Science and IT”, although it is not entirely new there is a trend of similar titles in many international conferences. However, for a book this title certainly has innovation and many articles presented in the text shows there uniqueness likewise the title.

    pdf0p bi_bi1 11-07-2012 37 12   Download

  • It has been many decades, since Computer Science has been able to achieve tremendous recognition and has been applied in various fields, mainly computer programming and software engineering. Many efforts have been taken to improve knowledge of researchers, educationists and others in the field of computer science and engineering. This book provides a further insight in this direction. It provides innovative ideas in the field of computer science and engineering with a view to face new challenges of the current and future centuries....

    pdf0p bi_bi1 11-07-2012 46 10   Download

  • Computer vision uses digital computer techniques to extract, characterize, and interpret information in visual images of a three-dimensional world. The goal of computer vision is primarily to enable engineering systems to model and manipulate the environment by using visual sensing. The field of computer vision can be characterized as immature and diverse. Even though earlier work exists, it was not until the late 1970s that a more focused study of the field started when computers could manage the processing of large data sets such as images....

    pdf0p bi_bi1 11-07-2012 24 8   Download

  • Parallel and distributed computing has offered the opportunity of solving a wide range of computationally intensive problems by increasing the computing power of sequential computers. Although important improvements have been achieved in this field in the last 30 years, there are still many unresolved issues. These issues arise from several broad areas, such as the design of parallel systems and scalable interconnects, the efficient distribution of processing tasks, or the development of parallel algorithms....

    pdf298p bi_bi1 11-07-2012 35 5   Download

  • Mobile service robots are the class of robots that have tools to understand the environments at home and office. The development of mobile robots is increasing world-wide due to the availability of moderate price sensing and computing devices. Moreover, there is a strong belief that the market for service robots is just about to undergo a radical increase in the next few years.

    pdf240p bi_bi1 11-07-2012 30 3   Download

  • Preparing Students for the Computer-Based Test has been created for ESL/EFL instructors and educational advisors so they can help students prepare for the computer-based TOEFL® test. It has been prepared by Educational Testing Service (ETS), which develops and scores the TOEFL test. TOEFL Tips can help students do their best on the test. However, it is not meant to replace the TOEFL Information Bulletin for Computer-Based Testing, which contains information students need to make appointments for and become familiar with the test.

    pdf41p thuyduong286 12-12-2009 475 327   Download

  • Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is one of the least secure forms of security.Many laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has great benefits. However, wireless networking is prone to some security issues. Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into wired networks......

    ppt41p 260786 25-11-2009 203 108   Download

  • The Internet is now a household term in many countries. With otherwise serious people beginning to joyride along the Information Superhighway, computer networking seems to be moving toward the status of TV sets and microwave ovens. The Internet has unusually high media coverage, and social science majors are descending on Usenet newsgroups, online virtual reality environments, and the Web to conduct research on the new "Internet Culture."

    pdf330p nguyenthucanh 03-05-2010 113 41   Download

  • One thousand Java Tips is 856 pages of A4 format of Java tips, advises and solutions from real daily Java experience. Quite often updated (330, 500, 850 and finally 1000 Java Tips), this e-book becomes more and more useful for Java developers with 2-6 years experience in this area. Questions are not from simple usual FAQs. They are especially good for those who look for Java job interview questions: both for those who hire and who look for Java jobs.

    pdf0p itvovantien 13-06-2012 107 40   Download

  • That’s where The Creative Training Idea Book can help. By providing a comprehensive resource of research on learning, creative tips, techniques, and sources for obtaining innovative and inexpensive items to add pizzazz to any training program, I hope to spark your imagination. I also intend to provide you with a valuable tool for future reference in your efforts to create the best possible learning environment and experience for your audiences

    pdf481p ledung 13-03-2009 131 32   Download

  • This document is a collection of slang terms used by various subcultures of computer hackers. Though some technical material is included for background and flavor, it is not a technical dictionary; what we describe here is the language hackers use among themselves for fun, social communication, and technical debate.

    pdf274p ken333 06-07-2012 89 31   Download

  • Longman Preparation Course for the TOEFL® Test? Volume A — Audio Cassettes, Second Edi-tion contain recordings of the listening comprehension exercises and tests in this text. Longman Preparation Course for the TOEFL® Test: Volume A — User's Guide, Second Edition includes an answer key with answers to all questions, a recording script with a transcription of all listening comprehension exercises and tests included on the audio cassette tapes or CDs accom-panying the text, and teaching tips for each section of the test....

    pdf10p kathy206 31-07-2010 82 29   Download

  • Linux is the name of a computer operating system and also the name of the operating system kernel. It is probably the most famous example of free software and open source development. The first Linux version written by Linus Torvalds in 1991, when he was a student at the University of Helsinki in Finland. He worked with enthusiasm for 3 consecutive years and released Linux version 1.0 in 1994. Key component was developed and launched on the market under the GNU General Public License. So that anyone can download and view the source code of Linux...

    pdf134p linhniit22091986 12-10-2010 75 23   Download

  • Artificial Intelligence (AI) is often referred to as a branch of science which deals with helping machines find solutions to complex problems in a more human-like fashion. It is generally associated with Computer Science, but it has many important links with other fields such as Maths, Psychology, Cognition, Biology and Philosophy. The AI success is due to its technology has diffused into everyday life. Neural networks, fuzzy controls, decision trees and rule-based systems are already in our mobile phones, washing machines and business applications....

    pdf498p bi_bi1 11-07-2012 58 21   Download

  • User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet.

    pdf200p entrysky 10-10-2011 67 18   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản