Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computational Intelligence in Data Mining - Volume 3: Proceedings of the International Conference on CIDM, 20-21 December 2014 (Smart Innovation, Systems and Technologies)
Computational Intelligence in Data Mining - Volume 3: Proceedings of the International Conference on CIDM, 20-21 December 2014 (Smart Innovation, Systems and Technologies)

The contributed volume aims to explicate and address the difficulties and challenges for the seamless integration of two core disciplines of computer science, i.e., computational intelligence and data mining. Data Mining aims at the automatic discovery of underlying non-trivial knowledge from datasets by applying intelligent analysis...

The Shallows: What the Internet Is Doing to Our Brains
The Shallows: What the Internet Is Doing to Our Brains

“Is Google making us stupid?” When Nicholas Carr posed that question, in a celebrated Atlantic Monthly cover story, he tapped into a well of anxiety about how the Internet is changing us. He also crystallized one of the most important debates of our time: As we enjoy the Net’s bounties, are we sacrificing our...

M Is for (Data) Monkey: A Guide to the M Language in Excel Power Query
M Is for (Data) Monkey: A Guide to the M Language in Excel Power Query
Power Query is one component of the Power BI (Business Intelligence) product from Microsoft, and “M” is the name of the programming language created by it. As more business intelligence pros begin using Power Pivot, they find that they do not have the Excel skills to clean the data in Excel; Power Query solves this problem. This book...
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles

Your one-stop guide to learning and implementing artificial neural networks with Keras effectively

Key Features

  • Design and create neural network architectures on different domains using Keras
  • Integrate neural network models in your applications using this highly practical...
Applications of Information Systems to Homeland Security And Defense
Applications of Information Systems to Homeland Security And Defense
A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems’...
Adaptive Business Intelligence
Adaptive Business Intelligence
From the reviews of the first edition: 

"In this book the authors explain the science and application of numerous prediction and optimization techniques as well as how these concepts can be used to develop adaptive decision-making systems. The book is suitable for business and IT managers who make decisions in complex industrial and...

Microsoft(R) Office Project Server 2007 Unleashed
Microsoft(R) Office Project Server 2007 Unleashed
Microsoft Office Project Server 2007 Unleashed provides a comprehensive and in-depth overview of Microsoft Office Project Server 2007 and Enterprise Project Management (EPM). This book should be used as a reference to guide you through system capabilities and the use of more advanced product features in the context of your business...
The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine
The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine

Before digital computers ever existed, Alan Turing envisioned their power and versatility...but also proved what computers could never do.

In an extraordinary and ultimately tragic life that unfolded like a novel, Turing helped break the German Enigma code to turn the tide of World War II, later speculated on...

Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition

Delve into neural networks, implement deep learning algorithms, and explore layers of data abstraction with the help of TensorFlow.

Key Features

  • Learn how to implement advanced techniques in deep learning with Google's brainchild, TensorFlow
  • Explore deep neural...
Eclipse in Action: A Guide for the Java Developer
Eclipse in Action: A Guide for the Java Developer
"The technical information is dead on...I'd definitely recommend this book to anyone."

This book is a fast-paced but thorough guide to the effective use of Eclipse's features and plugins for real-world Java development. Interesting examples demonstrate how to use Eclipse to build, test, and debug applications using
...
The Science of Supervillains
The Science of Supervillains
The science behind the scoundrels we love to hate

From Spider-Man’s bionic archenemy, Dr. Octopus, to Superman’s nemesis, Lex Luthor, to the X-Men’s eternal rival, Magneto, comic book villains have kept us captivated for years---- not just by their diabolical talent for confounding our heroes, but also by their unrivaled...

19 Deadly Sins of Software Security (Security One-off)
19 Deadly Sins of Software Security (Security One-off)

This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man...

unlimited object storage image
Result Page: 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy