Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Encyclopedia of Chart Patterns (Wiley Trading)
Encyclopedia of Chart Patterns (Wiley Trading)

The market's bestselling and most comprehensive reference on chart patterns, backed by statistics and decades of experience

When the smart money trades the securities markets, they leave behind financial footprints. Combine enough footprints together and you have a trail to follow. That trail becomes...

Python Text Processing with NLTK 2.0 Cookbook
Python Text Processing with NLTK 2.0 Cookbook

Natural Language Processing is used everywhere - in search engines, spell checkers, mobile phones, computer games - even your washing machine. Python's Natural Language Toolkit (NTLK) suite of libraries has rapidly emerged as one of the most efficient tools for Natural Language Processing. You want to employ nothing less than the best...

Image and Video Processing in the Compressed Domain
Image and Video Processing in the Compressed Domain

With more and more images and videos being available in the compressed format, researchers have started taking interest in the aspect of designing algorithms for different image operations directly in their domains of representation. This would not only avoid the inverse and forward transformation steps and potentially make the...

The Complete Field Guide to Dragonflies of Australia
The Complete Field Guide to Dragonflies of Australia
Dragonflies and damselflies are conspicuous insects: many are large and brightly colored. They are also valuable indicators of environmental wellbeing. A detailed knowledge of the dragonfly fauna is therefore an important basis for decisions about environmental protection and management.

This comprehensive guide to the
...
Transformers for Natural Language Processing: Build innovative deep neural network architectures for NLP with Python, PyTorch, TensorFlow, BERT, RoBERTa, and more
Transformers for Natural Language Processing: Build innovative deep neural network architectures for NLP with Python, PyTorch, TensorFlow, BERT, RoBERTa, and more

Take your NLP knowledge to the next level and become an AI language understanding expert by mastering the quantum leap of Transformer neural network models

Key Features

  • Build and implement state-of-the-art language models, such as the original Transformer, BERT, T5, and GPT-2, using...
Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches (Signals and Communication Technology)
Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches (Signals and Communication Technology)
Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches introduces engineers and researchers to the field of nonlinear adaptive system identification. The book includes recent research results in the area of adaptive nonlinear system identification and presents simple, concise, easy-to-understand methods for...
Computational Models of Reading: A Handbook (OXFORD SERIES ON COGNITIVE MODELS)
Computational Models of Reading: A Handbook (OXFORD SERIES ON COGNITIVE MODELS)
This book is about computational models of reading, or models that explain (and often simulate) the mental processes that allow us to convert the marks on a printed page into the representations that allow us to understand the contents of what we are reading. Computational Models of Reading
assumes no prior knowledge of the
...
Evolving Fuzzy Systems - Methodologies, Advanced Concepts and Applications
Evolving Fuzzy Systems - Methodologies, Advanced Concepts and Applications

In today’s real-world applications, there is an increasing demand of integrating new information and knowledge on-demand into model building processes to account for changing system dynamics, new operating conditions, varying human behaviors or environmental influences.

Evolving fuzzy systems (EFS) are a powerful tool...

Mechanics of User Identification and Authentication: Fundamentals of Identity Management
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
RFID Systems: Research Trends and Challenges
RFID Systems: Research Trends and Challenges

This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems

In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews...

unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy