Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro PowerShell for Database Developers
Pro PowerShell for Database Developers

Pro PowerShell for Database Developers helps you master PowerShell application development by continuing where other books leave off. There are no "Hello World" functions here, just real-world examples that get down to business. Develop and deploy database and ETL applications in a reusable framework. Read from any...

Modelling Distributed Energy Resources in Energy Service Networks (Iet Renewable Energy)
Modelling Distributed Energy Resources in Energy Service Networks (Iet Renewable Energy)

Modelling Distributed Energy Resources in Energy Service Networks focuses on modelling two key infrastructures in urban energy systems with embedded technologies. These infrastructures are natural gas and electricity networks and the embedded technologies include cogeneration and electric vehicle devices. The subject is addressed using...

Color Atlas of Human Poisoning and Envenoming
Color Atlas of Human Poisoning and Envenoming
The field of medical toxicology can be simply divided into animal and human poisonings from animal, plant, or man-made sources. Even more precisely, toxinology is the study of poisoning and envenoming by biological organisms, and toxicology is the study of human poisoning from manmade sources. Living organisms, such as animals,...
Unity 2018 Artificial Intelligence Cookbook: Over 90 recipes to build and customize AI entities for your games with Unity, 2nd Edition
Unity 2018 Artificial Intelligence Cookbook: Over 90 recipes to build and customize AI entities for your games with Unity, 2nd Edition

Explore various recipes to build games using popular artificial intelligence techniques and algorithms such as Navmesh navigation A*, DFS, and UCB1

Key Features

  • Explore different algorithms for creating decision-making agents that go beyond simple behaviors and movement
  • ...
Raspberry Pi for Secret Agents - Second Edition
Raspberry Pi for Secret Agents - Second Edition

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects

About This Book

  • Turn your Raspberry Pi into a multipurpose secret agent gadget for audio/video surveillance, Wi-Fi exploration, or playing pranks on your friends
  • Detect an intruder on camera...
Expert Scripting and Automation for SQL Server DBAs
Expert Scripting and Automation for SQL Server DBAs
As the ratio of DBAs to supported instances and supported databases continues to drop, DBAs must look to automation, to allow them to continue to improve or, in some cases, even offer the same level of service to the business as they have historically. This book attempts to give DBAs the tools they need to implement strategic...
New Trends in Applied Artificial Intelligence: 20th International Conference on Industrial, Engineering, and Other Applications of  Applied ... (Lecture Notes in Computer Science)
New Trends in Applied Artificial Intelligence: 20th International Conference on Industrial, Engineering, and Other Applications of Applied ... (Lecture Notes in Computer Science)
Applied artificial intelligence researchers have been focusing on developing and employing methods and systems to solve real-life problems in all areas including engineering, science, industry, automation & robotics, business & finance, cyberspace, and man–machine interactions. The 20th International...
Raspberry Pi for Secret Agents
Raspberry Pi for Secret Agents

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects!

Overview

  • Detect an intruder on camera and set off an alarm
  • Listen in or record conversations from a distance
  • Find out what the other computers on your network are up to
  • ...
A Computational Model of Natural Language Communication: Interpretation, Inference, and Production in Database Semantics
A Computational Model of Natural Language Communication: Interpretation, Inference, and Production in Database Semantics
Everyday life would be easier if we could simply talk with machines instead of having to program them. Before such talking robots can be built, however, there must be a theory of how communicating with natural language works. This requires not only a grammatical analysis of the language signs, but also a model of the cognitive agent, with...
The Machine Question: Critical Perspectives on AI, Robots, and Ethics
The Machine Question: Critical Perspectives on AI, Robots, and Ethics

One of the enduring concerns of moral philosophy is deciding who or what is deserving of ethical consideration. Much recent attention has been devoted to the "animal question" -- consideration of the moral status of nonhuman animals. In this book, David Gunkel takes up the "machine question": whether and to what extent...

Jess in Action: Java Rule-Based Systems
Jess in Action: Java Rule-Based Systems
A practical handbook for anyone interested in programming rule-based systems and written by the creator of the popular Java rule engine, Jess, this book is structured around a series of large, fully developed practical examples of rule-based programming in Java. After the topic of rule-based systems is introduced, software developers and...
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers

This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.

The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.

The papers dealt with subjects like virtual business alliances,...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy