Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Material Appearance Modeling: A Data-Coherent Approach
Material Appearance Modeling: A Data-Coherent Approach

A principal aim of computer graphics is to generate images that look as real as photographs. Realistic computer graphics imagery has however proven to be quite challenging to produce, since the appearance of materials arises from complicated physical processes that are difficult to analytically model and simulate, and image-based modeling of...

The St. Martin's Guide to Writing
The St. Martin's Guide to Writing


Whether you have years of experience as a teacher or are new to the classroom, you and your students can count on The St. Martin’s Guide to Writing to provide the support you need in first-year composition, with a rhetoric, an array of engaging readings, a research manual, and a handbook, all in a single book...

Trauma: Critical Care (Volume 2)
Trauma: Critical Care (Volume 2)

Compiled by internationally recognized experts in trauma critical care,this sourcediscusses the entire gamut of critical care management of the trauma patient and covers several common complications and conditions treated in surgical intensive care units that are not specifically related to trauma.  Utilizing evidence-based guidelines...

Big Data Analytics with SAS: Get actionable insights from your Big Data using the power of SAS
Big Data Analytics with SAS: Get actionable insights from your Big Data using the power of SAS

Leverage the capabilities of SAS to process and analyze Big Data

About This Book

  • Combine SAS with platforms such as Hadoop, SAP HANA, and Cloud Foundry-based platforms for effecient Big Data analytics
  • Learn how to use the web browser-based SAS Studio and iPython Jupyter Notebook...
Machine Learning for Mobile: Practical guide to building intelligent mobile applications powered by machine learning
Machine Learning for Mobile: Practical guide to building intelligent mobile applications powered by machine learning

Leverage the power of machine learning on mobiles and build intelligent mobile applications with ease

Key Features

  • Build smart mobile applications for Android and iOS devices
  • Use popular machine learning toolkits such as Core ML and TensorFlow Lite
  • Explore...
Enterprise Governance of Information Technology: Achieving Alignment and Value in Digital Organizations (Management for Professionals)
Enterprise Governance of Information Technology: Achieving Alignment and Value in Digital Organizations (Management for Professionals)
This book integrates theoretical advances and empirical data on Enterprise Governance in Information Technology (EGIT) with practical applications based on numerous case examples. The third revised edition of Enterprise Governance of Information Technology provides professionals and students with the most recent research advancements as...
Visual Saliency: From Pixel-Level to Object-Level Analysis
Visual Saliency: From Pixel-Level to Object-Level Analysis
This book provides an introduction to recent advances in theory, algorithms and application of Boolean map distance for image processing. Applications include modeling what humans find salient or prominent in an image, and then using this for guiding smart image cropping, selective image filtering, image segmentation, image matting, etc....
Customized Implementation of European Union Food Safety Policy: United in Diversity? (International Series on Public Policy)
Customized Implementation of European Union Food Safety Policy: United in Diversity? (International Series on Public Policy)
“As a Journal Editor for over twenty-five years, I have read a lot about the European Union. I am often asked, 'what are the major gaps in EU research?' My answer is always 'implementation'. Eva Thomann's book makes a major contribution to EU implementation studies. She brings really fresh thinking to...
J2EE Security for Servlets, EJBs, and Web Services
J2EE Security for Servlets, EJBs, and Web Services

J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,...

PIC Robotics: A Beginner's Guide to Robotics Projects Using the PIC Micro
PIC Robotics: A Beginner's Guide to Robotics Projects Using the PIC Micro
Complete, do-it-yourself robotics projects!

SMART 'BOTS!

* Artificial vision system that uses a CCD camera to track and follow brightly colored objects
* Bi-pedal robots that walk upright
* Functional robotic arm
* Easily programmed behavior-based robots
* Complete parts
...
Fundamentals of Speech Recognition
Fundamentals of Speech Recognition

Provides a theoretically sound, technically accurate, and complete description of the basic knowledge and ideas that constitute a modern system for speech recognition by machine. Covers production, perception, and acoustic-phonetic characterization of the speech signal; signal processing and analysis...

XML-Based Integration Using XA-Suite: Unifying Applications and Data in Today's e-Business World
XML-Based Integration Using XA-Suite: Unifying Applications and Data in Today's e-Business World

In order for a business to thrive in today’s dynamic world, its computing infrastructure must enable the secure flow of information—not only within the business but also with suppliers and customers. However, many of today’s computing infrastructures suffer from “information chaos” and are unable to support this...

unlimited object storage image
Result Page: 788 787 786 785 784 783 782 781 780 779 778 777 776 775 774 773 772 771 770 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy