Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python 3 Text Processing with NLTK 3 Cookbook
Python 3 Text Processing with NLTK 3 Cookbook

Over 80 practical recipes on natural language processing techniques using Python's NLTK 3.0

About This Book

  • Break text down into its component parts for spelling correction, feature extraction, and phrase transformation
  • Learn how to do custom sentiment analysis and named entity...
Genetic Programming IV: Routine Human-Competitive Machine Intelligence
Genetic Programming IV: Routine Human-Competitive Machine Intelligence

Genetic Programming IV: Routine Human-Competitive Machine Intelligence presents the application of GP to a wide variety of problems involving automated synthesis of controllers, circuits, antennas, genetic networks, and metabolic pathways. The book describes fifteen instances where GP has created an entity that either...

Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept
Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept
"…a comprehensive view of error coding theory and explores its use and implementation at all network layers…"
 (Computing Reviews.com, February 1, 2006)

This book provides a systematic approach to the problems involved in the application of error-correcting codes in data networks.
...
IP Location
IP Location

In today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,...

Agent Intelligence Through Data Mining (Multiagent Systems, Artificial Societies, and Simulated Organizations)
Agent Intelligence Through Data Mining (Multiagent Systems, Artificial Societies, and Simulated Organizations)

Knowledge, hidden in voluminous data repositories routinely created and maintained by today’s applications, can be extracted by data mining. The next step is to transform this discovered knowledge into the inference mechanisms or simply the behavior of agents and multi-agent systems. Agent Intelligence Through Data Mining addresses this...

Deep Inside osCommerce: The Cookbook
Deep Inside osCommerce: The Cookbook
osCommerce has been around since March 2000. At present there are over 10,000 live, registered osCommerce sites, and about 100,000 registered community members. Apart from providing ready-made solutions to problems, as well as a huge repository of information, the osCommerce community is a living entity with which we can all interact. With the...
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1)
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1)

Database Design Using Entity-Relationship Diagrams clarifies ER diagram design by defining it in terms of requirements (end user requests) and specifications (designer feedback to that request). The book emphasizes how communication between designers and users during design is crucial for the elicitation of targeted data, and for the creation of...

Metagraphs and Their Applications (Integrated Series in Information Systems)
Metagraphs and Their Applications (Integrated Series in Information Systems)
An important concept in the design of many information processing systems – such as transaction processing systems, decision support systems, and workflow systems – is that of a graph. In its simplest form a graph consists of a set of points (or nodes) and a set of ordered or unordered pairs of nodes (or edges). If the pairs of nodes...
Introduction to Genetic Algorithms
Introduction to Genetic Algorithms

The origin of evolutionary algorithmswas an attempt tomimic some of the processes taking place in natural evolution. Although the details of biological evolution are not completely understood (even nowadays), there exist some points supported by strong experimental evidence:

• Evolution is a process operating over chromosomes...

Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Aimed at the more experienced Java developer who needs to work with enterprise messaging, Java Message Service API Tutorial and Reference delivers starter code and a complete reference to all JMS classes that you will need to know to work effectively with this powerful feature of the J2EE platform.

The no-nonsense, just-the-facts...

Beginning EJB 3 Application Development: From Novice to Professional
Beginning EJB 3 Application Development: From Novice to Professional

EJB 3.0 has made huge advances in ease of development, and its drastically simplified programming model has been widely acclaimed. Targeted at Java and J2EE developers both with and without prior EJB experience, Beginning EJB 3 Application Development takes readers through the details of the EJB 3.0 architecture, and shows how EJB can...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy