Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning and Robot Perception (Studies in Computational Intelligence)
Machine Learning and Robot Perception (Studies in Computational Intelligence)
This book presents some of the most recent research results in the area of machine learning and robot perception. The book contains eight chapters.

Relevant progress has been done, within the Robotics field, in mechanical systems, actuators, control and planning. This fact, allows a wide application of industrial robots, where
...
C++/CLI: The Visual C++ Language for .NET
C++/CLI: The Visual C++ Language for .NET
C++/CLI: The Visual C++ Language for .NET introduces Microsoft's new extensions to the C++ syntax that allow you to target the common language runtimethe key to the heart of the .NET 3.0 platform. In 12 no-fluff chapters, Microsoft insider Gordon Hogenson takes you into the core of the C++/CLI language and explains both how the language...
Mastering OpenCV 4 with Python: A practical guide covering topics from image processing, augmented reality to deep learning with OpenCV 4 and Python 3.7
Mastering OpenCV 4 with Python: A practical guide covering topics from image processing, augmented reality to deep learning with OpenCV 4 and Python 3.7

Create advanced applications with Python and OpenCV, exploring the potential of facial recognition, machine learning, deep learning, web computing and augmented reality.

Key Features

  • Develop your computer vision skills by mastering algorithms in Open Source Computer Vision 4 (OpenCV 4)and...
Foundations of Dependable Computing: Paradigms for Dependable Applications
Foundations of Dependable Computing: Paradigms for Dependable Applications
Foundations of Dependable Computing: Paradigms for Dependable Applications, presents a variety of specific approaches to achieving dependability at the application level. Driven by the higher level fault models of Models and Frameworks for Dependable Systems, and built on the lower level abstractions implemented in a third companion book...
Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python
Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python

Develop real-world applications powered by the latest advances in intelligent systems

Key Features

  • Gain real-world contextualization using deep learning problems concerning research and application
  • Get to know the best practices to improve and optimize your machine...
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and...
Multimedia Systems: Algorithms, Standards, and Industry Practices
Multimedia Systems: Algorithms, Standards, and Industry Practices

Multimedia is now a broad “umbrella” that innovatively combines different fields of research and industry to produce practical solutions that are used on a wide scale today. Some of these fields are signal processing, imaging and color science, video and audio analysis, 2D/3D graphics, information theory, compression,...

Pro Windows Phone App Development (Professional Apress)
Pro Windows Phone App Development (Professional Apress)
Windows Phone, updated in Windows Phone 7.5, presents an exciting opportunity for developers to build and monetize mobile applications. It represents a major new investment into mobile computing by Microsoft, and in many ways is a major break from the past. To build applications for Windows Phone, it is important to understand its...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World

Traditional learning as we know it has evolved. Gone are the days when students need to travel to a physical location to learn. With the increase of mobile devices and broadband Internet services, learning can take place anywhere at any time. Effective Digital Learning is here to help you make the paradigm shift with...

Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and...
Pro Java 7 NIO.2 (Professional Apress)
Pro Java 7 NIO.2 (Professional Apress)

The recommended entry point to start exploring the NIO.2 API, also known as “JSR 203: More New I/O

APIs for the Java Platform” (NIO.2), is the new abstract class java.nio.file.Path. This class is a milestone of NIO.2, and every application that involves I/O operations will exploit the powerful facilities of this
...
unlimited object storage image
Result Page: 62 61 60 59 58 57 56 55 54 53 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy