Home | Amazing | Today | Tags | Publishers | Years | Search 
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition

Learn advanced state-of-the-art deep learning techniques and their applications using popular Python libraries

Key Features

  • Build a strong foundation in neural networks and deep learning with Python libraries
  • Explore advanced deep learning techniques and their applications...
Deep Learning with PyTorch: A practical approach to building neural network models using PyTorch
Deep Learning with PyTorch: A practical approach to building neural network models using PyTorch

Build neural network models in text, vision and advanced analytics using PyTorch

Key Features

  • Learn PyTorch for implementing cutting-edge deep learning algorithms.
  • Train your neural networks for higher speed and flexibility and learn how to implement them in various...
Deep Learning with Python: Learn Best Practices of Deep Learning Models with PyTorch
Deep Learning with Python: Learn Best Practices of Deep Learning Models with PyTorch
Master the practical aspects of implementing deep learning solutions with PyTorch, using a hands-on approach to understanding both theory and practice. This updated edition will prepare you for applying deep learning to real world problems with a sound theoretical foundation and practical know-how with PyTorch, a platform developed by...
An Extended Entity-Relationship Model: Fundamentals and Pragmatics (Lecture Notes in Computer Science)
An Extended Entity-Relationship Model: Fundamentals and Pragmatics (Lecture Notes in Computer Science)
Studying modern database languages one recognizes that there is a gap between language features and theoretical foundations:

* Studies of the formal foundations exist for the relational data model but not for the Entity-Relationship model, which is a model used by numerous practical people. Also, most extensions of
...
Agile IT Security Implementation Methodology
Agile IT Security Implementation Methodology

Agile methodologies attack risk at its core. To identify risk early and often is the premise of agile security. Risk comes in many forms. Organizations face security threats every day. Risks are in the delivery and maintenance of the countermeasures. Agile IT Security focuses on the details of the steps in delivering and maintaining...

Principles of Communications Networks and Systems
Principles of Communications Networks and Systems

This book addresses the fundamentals of communications systems and networks, providing models and analytical methods for evaluating their performance. It is divided into ten chapters, which are the result of a joint effort by the authors and contributors. The authors and the contributors have a long history of collaboration, both in...

Fundamentals of Scientific Computing (Texts in Computational Science and Engineering)
Fundamentals of Scientific Computing (Texts in Computational Science and Engineering)

Computers play an increasingly important role in our society. A breakdown of all computer systems would cause a breakdown of almost all activities of daily life. Furthermore, personal computers are available in almost every home in the industrialized world. But there is one sector where computers have a more strategic role, and that...

IBM Cognos TM1 Cookbook
IBM Cognos TM1 Cookbook

IBM Cognos TM1 is one of the most popular multidimensional analysis tools used to build collaborative planning, budgeting, and forecasting solutions, as well as analytical and reporting applications. This cube-based technology does fast number crunching at the server end and helps end customers move away from manual and tedious planning,...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Pro Android 4 (Professional Apress)
Pro Android 4 (Professional Apress)

Pro Android 4 shows you how to build real-world and fun mobile apps using the new Android SDK 4 (Ice Cream Sandwich), which unifies Gingerbread for smartphones, Honeycomb for tablets and augments further with Google TV and more. This Android 4 book updates the best selling Pro Android 3 and covers everything...

Fundamentals of Quantum Chemistry: Molecular Spectroscopy and Modern Electronic Structure Computations
Fundamentals of Quantum Chemistry: Molecular Spectroscopy and Modern Electronic Structure Computations

As quantum theory enters its second century, it is fitting to examine just how far it has come as a tool for the chemist. Beginning with Max Planck’s agonizing conclusion in 1900 that linked energy emission in discreet bundles to the resultant black-body radiation curve, a body of knowledge has developed with profound consequences in...

Fundamentals of Speaker Recognition
Fundamentals of Speaker Recognition
When I was being interviewed at the handwriting recognition group of IBM T.J. Watson Research Center in December of 1990, one of the interviewers asked me why, being a mechanical engineer, I was applying for a position in that group. Well, he was an electrical engineer and somehow was under the impression that handwriting...
Result Page: 197 196 195 194 193 192 191 190 189 188 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy