Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deep Belief Nets in C++ and CUDA C: Volume 2: Autoencoding in the Complex Domain
Deep Belief Nets in C++ and CUDA C: Volume 2: Autoencoding in the Complex Domain
Discover the essential building blocks of a common and powerful form of deep belief net: the autoencoder. You’ll take this topic beyond current usage by extending it to the complex domain for signal and image processing applications. Deep Belief Nets in C++ and CUDA C: Volume 2 also covers several...
Scratch by Example: Programming for All Ages
Scratch by Example: Programming for All Ages
This is a book about learning the Scratch language so that you can use it in teaching and other instructional situations. The book explains the visual nature of the language, showing you how to write programs by dragging and dropping visual blocks representing common compute operations. 

Scratch is visual...
Electronic and Algorithmic Trading Technology: The Complete Guide
Electronic and Algorithmic Trading Technology: The Complete Guide

Electronic and algorithmic trading has become part of a mainstream response to buy-side traders' need to move large blocks of shares with minimum market impact in today's complex institutional trading environment. This book illustrates an overview of key providers in the marketplace. With electronic trading platforms becoming...

Practical NATS: From Beginner to Pro
Practical NATS: From Beginner to Pro

Learn to use NATS and messaging as a solution for communication between services. The NATS project has been around since 2010, but it has become more popular in recent years due to how well it fits into the paradigm of cloud native applications and microservices architectures. It’s fast becoming a very attractive option thanks...

Understanding Context: Environment, Language, and Information Architecture
Understanding Context: Environment, Language, and Information Architecture
To make sense of the world, we're always trying to place things in context, whether our environment is physical, cultural, or something else altogether. Now that we live among digital, always-networked products, apps, and places, context is more complicated than ever--starting with "where" and "who" we are.
...
QGIS Python Programming Cookbook
QGIS Python Programming Cookbook

Over 140 recipes to help you turn QGIS from a desktop GIS tool into a powerful automated geospatial framework

About This Book

  • Use Python and QGIS to create and transform data, produce appealing GIS visualizations, and build complex map layouts
  • Learn undocumented features of the new QGIS...
Learning Geospatial Analysis with Python - Second Edition
Learning Geospatial Analysis with Python - Second Edition

An effective guide to geographic information systems and remote sensing analysis using Python 3

About This Book

  • Construct applications for GIS development by exploiting Python
  • This focuses on built-in Python modules and libraries compatible with the Python Packaging Index distribution...
Transaction-Level Modeling with Systemc: Tlm Concepts and Applications for Embedded Systems
Transaction-Level Modeling with Systemc: Tlm Concepts and Applications for Embedded Systems
Throughout the evolution of microelectronics industry, SoC designers
have always been struggling to improve their productivity in order to fully
exploit the growing number of transistors on a chip achievable by the silicon
process capacity.

The answer to this challenge has always been increasing the level of...
Visual C# 2005 Demystified
Visual C# 2005 Demystified
The FAST and EASY way to learn VISUAL C+ 2005

Start programming in Visual C# 2005 right away -- even if you don't have formal training, unlimited time, or a genius IQ. In Visual C# 2005 Demystified, programming instructor Jeff Kent provides an effective, illuminating, and entertaining way to learn to use this...

Cryptographic  Boolean  Functions and Applications
Cryptographic Boolean Functions and Applications
Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).

Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean
...
concrete5 Beginner's Guide
concrete5 Beginner's Guide

The concrete5 Beginner's Guide will show you how to get up and running with concrete5 as quickly and painlessly as possible. Taking you from installation to deployment, this is the only reference that you will need for creating your new concrete5 site.

By using a number of real-world examples, as well as taking you through the...

UNIX System Programming for System VR4 (Nutshell Handbooks)
UNIX System Programming for System VR4 (Nutshell Handbooks)

Any program worth its salt uses operating system services. Even a simple program, if practical, reads input and produces output. And, most applications have more complex needs. They need to find out the time, use the network, or start and communicate with other processes. Systems programming really means nothing more than writing...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy