Home | Amazing | Today | Tags | Publishers | Years | Search 
Absolute Beginner's Guide to Building Robots
Absolute Beginner's Guide to Building Robots

Finally, a robots book for people who don't know the first thing about robotics! Absolute Beginner's Guide to Robots is well-written, inviting, and action-packed, with engaging ideas and fascinating factoids about robots and robot-related arts and sciences. You are led gently into the...

Machine Learning and Robot Perception (Studies in Computational Intelligence)
Machine Learning and Robot Perception (Studies in Computational Intelligence)
This book presents some of the most recent research results in the area of machine learning and robot perception. The book contains eight chapters.

Relevant progress has been done, within the Robotics field, in mechanical systems, actuators, control and planning. This fact, allows a wide application of industrial robots, where
...
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition

Learn advanced state-of-the-art deep learning techniques and their applications using popular Python libraries

Key Features

  • Build a strong foundation in neural networks and deep learning with Python libraries
  • Explore advanced deep learning techniques and their applications...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany

The "European Institute for System Security (E.I.S.S.)" was founded on February 29, 1988 by cabinet resolution of the state government Baden-Wurttemberg. It is headed by Professor Thomas Beth and is affiliated with the Institute for Algorithms and Cognitive Systems (IAKS) of the Faculty for Computer Science at the University of...

Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

GSM System Engineering (Artech House Mobile Communications Series)
GSM System Engineering (Artech House Mobile Communications Series)
Cellular communications is one of the fastest growing and most challenging telecommunication applications ever. Today, it represents a large and continuously increasing percentage of all new telephone subscribers around the world. In the long term, cellular digital technology may become the universal way of communication.
...
Web Analytics Action Hero: Using Analysis to Gain Insight and Optimize Your Business
Web Analytics Action Hero: Using Analysis to Gain Insight and Optimize Your Business
This astounding declaration was made by the former PepsiCo executive and Apple CEO John Sculley, the same visionary responsible for ousting Steve Jobs in 1985. While some traditional marketers might still agree with his statement, today most marketing executives recognize data-driven decisions will shape the future of...
Encyclopedia of Parallel Computing (Springer Reference)
Encyclopedia of Parallel Computing (Springer Reference)
Parallelism, the capability of a computer to execute operations concurrently, has been a constant throughout the history of computing. It impacts hardware, software, theory, and applications. The fastest machines of the past few decades, the supercomputers, owe their performance advantage to parallelism. Today, physical limitations...
Robotic Micro-Assembly
Robotic Micro-Assembly
This book deals with the current methods developed around the world on robotic microassembly. It is dedicated to Master’s and Ph.D. students, and also scientists and engineers involved in microrobotics and also in robotics. As robotic microassembly is a new way to manufacture microelectromechanical systems (MEMS),...
Working With Objects:The Ooram Software Engineering Method
Working With Objects:The Ooram Software Engineering Method
The book describes the principles behind an industrial approach to software production. We claim that the technological basis of industrial software production should be object orientation. A large part of the book is devoted to explaining all the different things you can do with objects; we will also match the different...
Mastering Xcode 4: Develop and Design
Mastering Xcode 4: Develop and Design
This book is an intermediate-level introduction to Xcode 4, Apple’s integrated development environment. It assumes you have some development experience and are familiar with the Cocoa API. It won’t teach you how to write code or much at all about Cocoa. There are other books for that. This one is strictly focused on...
Result Page: 272 271 270 269 268 267 266 265 264 263 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy