Home | Amazing | Today | Tags | Publishers | Years | Search 
Deep Learning By Example: A hands-on guide to implementing advanced machine learning algorithms and neural networks
Deep Learning By Example: A hands-on guide to implementing advanced machine learning algorithms and neural networks

Grasp the fundamental concepts of deep learning using Tensorflow in a hands-on manner

Key Features

  • Get a first-hand experience of the deep learning concepts and techniques with this easy-to-follow guide
  • Train different types of neural networks using Tensorflow for...
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger

Implement decentralized blockchain applications to build scalable Dapps

Key Features

  • Understand the blockchain ecosystem and its terminologies
  • Implement smart contracts, wallets, and consensus protocols
  • Design and develop decentralized applications using...
Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner
Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner

Though your application serves its purpose, it might not be a high performer. Learn techniques to accurately predict code efficiency, easily dismiss inefficient solutions, and improve the performance of your application.

Key Features

  • Explains in detail different algorithms and data...
Mastering Elixir: Build and scale concurrent, distributed, and fault-tolerant applications
Mastering Elixir: Build and scale concurrent, distributed, and fault-tolerant applications

Leverage the power of Elixir programming language to solve practical problems associated with scalability, concurrency, fault tolerance, and high availability.

Key Features

  • Enhance your Elixir programming skills using its powerful tools and abstractions
  • Discover how to...
Generative Adversarial Networks Projects: Build next-generation generative models using TensorFlow and Keras
Generative Adversarial Networks Projects: Build next-generation generative models using TensorFlow and Keras

Explore various Generative Adversarial Network architectures using the Python ecosystem

Key Features

  • Use different datasets to build advanced projects in the Generative Adversarial Network domain
  • Implement projects ranging from generating 3D shapes to a face aging...
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform

Efficiently deploy and manage Kubernetes clusters on a cloud

Key Features

  • Deploy highly scalable applications with Kubernetes on Azure
  • Leverage AKS to deploy, manage, and operations of Kubernetes
  • Gain best practices from this guide to increase efficiency...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Monetizing Machine Learning: Quickly Turn Python ML Ideas into Web Applications on the Serverless Cloud
Monetizing Machine Learning: Quickly Turn Python ML Ideas into Web Applications on the Serverless Cloud

Take your Python machine learning ideas and create serverless web applications accessible by anyone with an Internet connection. Some of the most popular serverless cloud providers are covered in this book?Amazon, Microsoft, Google, and PythonAnywhere.

You will work through a series of common Python data science problems...

Theoretical Computer Science: 6th IFIP WG 2.2 International Conference, TCS 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, ... in Information and Communication Technology)
Theoretical Computer Science: 6th IFIP WG 2.2 International Conference, TCS 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, ... in Information and Communication Technology)
Thisvolumecontainstheinvitedandregularpaperspresentedat TCS 2010,the 6thIFIP International Conference on Theoretical Computer Science, organised by IFIP Tech- cal Committee 1 (Foundations of Computer Science) and IFIP WG 2.2 (Formal - scriptions of Programming Concepts) in association with SIGACT and EATCS. TCS 2010 was part of the World...
Algorithmic Number Theory, Vol. 1: Efficient Algorithms (Foundations of Computing)
Algorithmic Number Theory, Vol. 1: Efficient Algorithms (Foundations of Computing)

Algorithmic Number Theory provides a thorough introduction to the design and analysis of algorithms for problems from the theory of numbers. Although not an elementary textbook, it includes over 300 exercises with suggested solutions. Every theorem not proved in the text or left as an exercise has a reference in the notes section...

Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of...
Digital Cultural Heritage
Digital Cultural Heritage
This book provides an overview of various application spheres and supports further innovations needed in information management and in the processes of knowledge generation. The professions, organizations and scientific associations involved are unusually challenged by the complexity of the data situation.

...
Result Page: 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy