Home | Amazing | Today | Tags | Publishers | Years | Search 
Hands-On Machine Learning for Algorithmic Trading: Design and implement investment strategies based on smart algorithms that learn from data using Python
Hands-On Machine Learning for Algorithmic Trading: Design and implement investment strategies based on smart algorithms that learn from data using Python

Explore effective trading strategies in real-world markets using NumPy, spaCy, pandas, scikit-learn, and Keras

Key Features

  • Implement machine learning algorithms to build, train, and validate algorithmic models
  • Create your own algorithmic design process to apply...
Advanced Simulation and Test Methodologies for VLSI Design
Advanced Simulation and Test Methodologies for VLSI Design

With the advent of LSI and subsequently VLSI, technology has never witnessed such an unprecedented growth in the use of electronic systems in a wide range of applications. Although the ability to integrate several hundreds of thousands of transistors into a monolithic integrated circuit offers many advantages, a major concern in the...

Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011
Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011

It was a real pleasure to have taken part in organizing the 10th International Conference on Cryptography and Network Security (CANS 2011). It was held during December 10–12, 2011, at the International Asia Pacific Convention Center in Sanya, on the subtropical island of Hainan (China). CANS 2011 was sponsored by the National...

Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing
Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing

Ongoing economic challenges are affecting and impacting business and society in nearly every industry and geographical region. Taking decisive action to reprioritize the way we are doing business is a key focus for companies. Around the world, companies are taking the necessary measures that will enable us to adjust to today’s reality...

iPhone User Interface Cookbook
iPhone User Interface Cookbook

The incredible growth rates for the iPhone, iPod touch, and iPad have pushed consumers to a new "App" economy, with developers racing to the platform. Mobile touch-centric interfaces vary greatly from traditional computing platforms, and programmers as well as designers must learn to adapt to the new form-factor.

...

Personalization Techniques And Recommender Systems
Personalization Techniques And Recommender Systems

The phenomenal growth of the Internet has resulted in the availability of huge amounts of online information, a situation that is overwhelming to the end-user. To overcome this problem personalization technologies have been extensively employed across several domains to provide assistance in filtering, sorting, classifying and sharing...

Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference

Cutting planes (cuts) are very popular in the OR community, where they are used to strengthen the Linear Programming (LP) relaxation of Mixed-Integer Programs (MIPs) in the hope of improving the performance of an exact LPbased solver. In particular, an intense research effort has been devoted to the study of families of general cuts,...

Building Hypermedia APIs with HTML5 and Node
Building Hypermedia APIs with HTML5 and Node

This book’s primary focus is on designing hypermedia APIs. That may seem a bit strange to some readers. There are many books on programming languages, data storage systems, web frameworks, etc. This is not one of those books. Instead, this book covers the nature of the messages passed between client and server, and how to improve...

Financial Cryptography and Data Security: 12th International Conference, FC 2008
Financial Cryptography and Data Security: 12th International Conference, FC 2008

I am are very happy to have taken part in the 12th Financial Cryptography and Data Security Conference (FC 2008). Due to the recent growth in the number of security and cryptography venues, the competition for high-quality submissions has been on the rise. Despite that, the continued success of FC is attested by the research...

Handbook of Discrete and Computational Geometry
Handbook of Discrete and Computational Geometry

While books and journals of high quality have proliferated in discrete and compu- tational geometry during recent years, there has been to date no single reference work fully accessible to the nonspecialist as well as to the specialist, covering all the major aspects of both fields. The Handbook of Discrete and Computational Geometry...

Quantum Computing
Quantum Computing

The twentieth century witnessed the birth of revolutionary ideas in the phys- ical sciences. These ideas began to shake the traditional view of the universe dating back to the days of Newton, even to the days of Galileo. Albert Ein- stein is usually identified as the creator of the relativity theory, a theory that is used to model the...

Neural Networks and Their Applications
Neural Networks and Their Applications

Neural Networks started as an academic discipline over 50 years ago with the publication by McCulloch and Pitts of their famous result that any logical problem can be solved by a suitable network composed of so-called binary decision nodes. These are processors which make the simplest possible decision, that is, whether or not to respond to a...

Result Page: 107 106 105 104 103 102 101 100 99 98 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy