Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning Entity Framework Core 2.0: Database Access from .NET
Beginning Entity Framework Core 2.0: Database Access from .NET
Use the valuable Entity Framework Core 2.0 tool in ASP.NET and the .NET Framework to eliminate the tedium around accessing databases and the data they contain.

Entity Framework Core 2.0 greatly simplifies access to relational databases such as SQL Server that are commonly deployed in corporate settings. By
...
Hands-On Java Deep Learning for Computer Vision: Implement machine learning and neural network methodologies to perform computer vision-related tasks
Hands-On Java Deep Learning for Computer Vision: Implement machine learning and neural network methodologies to perform computer vision-related tasks

Leverage the power of Java and deep learning to build production-grade Computer Vision applications

Key Features

  • Build real-world Computer Vision applications using the power of neural networks
  • Implement image classification, object detection, and face recognition
  • ...
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition

Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2

Key Features

  • Place Wireshark 2 in your network and configure it for effective network analysis
  • Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease
  • ...
Veracity of Big Data: Machine Learning and Other Approaches to Verifying Truthfulness
Veracity of Big Data: Machine Learning and Other Approaches to Verifying Truthfulness
Examine the problem of maintaining the quality of big data and discover novel solutions. You will learn the four V’s of big data, including veracity, and study the problem from various angles. The solutions discussed are drawn from diverse areas of engineering and math, including machine learning, statistics, formal methods, and...
Instructional Design Principles for High-Stakes Problem-Solving Environments
Instructional Design Principles for High-Stakes Problem-Solving Environments

This book examines the types of problems and constraints faced by specialists in the areas of security, medicine, mental health, aviation and engineering. Every day we rely on highly trained specialists to solve complex problems in high-stakes environments, that is, environments involving direct threats to the preservation of human...

The Handbook of Communication Skills
The Handbook of Communication Skills

The Handbook of Communication Skills is recognised as one of the core texts in the field of communication, offering a state-of-the-art overview of this rapidly evolving field of study. This comprehensively revised and updated fourth edition arrives at a time when the realm of interpersonal communication has attracted immense...

A Hetero-functional Graph Theory for Modeling Interdependent Smart City Infrastructure
A Hetero-functional Graph Theory for Modeling Interdependent Smart City Infrastructure

Cities have always played a prominent role in the prosperity of civilization.   Indeed, every great civilization we can think of is associated with the prominence of one or more thriving cities.   And so understanding cities -- their inhabitants, their institutions, their infrastructure -- what they are and how...

The Routledge Handbook of Chinese Discourse Analysis
The Routledge Handbook of Chinese Discourse Analysis

Chinese is a discourse-oriented language and the underlying mechanisms of the language involve encoding and decoding so the language can be correctly delivered and understood. To date, there has been a lack of consolidation at the discourse level such that a reference framework for understanding the language in a top-down fashion is...

Crowd Behavior Simulation of Pedestrians During Evacuation Process: DEM-Based Approach (SpringerBriefs in Applied Sciences and Technology)
Crowd Behavior Simulation of Pedestrians During Evacuation Process: DEM-Based Approach (SpringerBriefs in Applied Sciences and Technology)

This book introduces the use of the distinct element method (DEM) in modeling crowd behavior and simulating evacuation processes. Focusing on the mathematical computation of the uncertain behavior of evacuees, which is switching action behavior, it subsequently reproduces the crowd evacuation process under several conjectural...

Circuit Analysis for Complete Idiots
Circuit Analysis for Complete Idiots
In today’s world, there’s an electronic gadget for everything and inside these gadgets are circuits, little components wired together to perform some meaningful function. Have you wondered how a led display sign works or how a calculator works or toy cars work? How is it possible?? All because of electrical circuits. These tiny...
Harnessing Performance Variability in Embedded and High-performance Many/Multi-core Platforms: A Cross-layer Approach
Harnessing Performance Variability in Embedded and High-performance Many/Multi-core Platforms: A Cross-layer Approach

This book describes the state-of-the art of industrial and academic research in the architectural design of heterogeneous, multi/many-core processors. The authors describe methods and tools to enable next-generation embedded and high-performance heterogeneous processors to confront cost-effectively the inevitable variations by...

Computational Topology in Image Context: 7th International Workshop, CTIC 2019, Málaga, Spain, January 24-25, 2019, Proceedings (Lecture Notes in Computer Science (11382))
Computational Topology in Image Context: 7th International Workshop, CTIC 2019, Málaga, Spain, January 24-25, 2019, Proceedings (Lecture Notes in Computer Science (11382))

This book constitutes the proceedings of the 7th International Workshop on Computational Topology in Image Context, CTIC 2019, held in Málaga, Spain, in January 2019. 

The 14 papers presented in this volume were carefully reviewed and selected from 21 submissions. Papers deal with theoretical issues but most...

Result Page: 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy