Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Internet of Things: Key Applications and Protocols
The Internet of Things: Key Applications and Protocols

An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use...

Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models
Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models

Explore and master the most important algorithms for solving complex machine learning problems.

Key Features

  • Discover high-performing machine learning algorithms and understand how they work in depth
  • One-stop solution to mastering supervised, unsupervised, and...
Machine Learning with Python: The Definitive Tool to Improve Your Python Programming and Deep Learning to Take You to The Next Level of Coding and Algorithms Optimization
Machine Learning with Python: The Definitive Tool to Improve Your Python Programming and Deep Learning to Take You to The Next Level of Coding and Algorithms Optimization

Machine learning is rapidly changing the world, from diverse types of applications and research pursued in industry and academia. 

Machine learning is affecting every part of your daily life. From voice assistants using NLP and machine learning to make appointments, check your calendar, and play music,...

Build the Ultimate Custom PC
Build the Ultimate Custom PC

Take control of your PC!

Why do they load up a PC with stuff you don't need and leave off the things you really want? Don't take it anymore! Grab a screwdriver and let these two experts show you how to build the PC of your dreams, even if you've never cracked a case before. You'll learn to choose...

.NET Framework Security
.NET Framework Security
Welcome! The book you hold in your hands is a comprehensive guide and roadmap to the security infrastructure of the Microsoft .NET Framework. The .NET Framework is Microsoft's new cross-language development environment for building rich client applications and XML Web Services. One of the key features of the .NET Framework is a robust security...
Electroactive Polymers for Robotic Applications: Artificial Muscles and Sensors
Electroactive Polymers for Robotic Applications: Artificial Muscles and Sensors
Electroactive polymers (EAPs) respond to electrical stimulation with large deformations. They are dynamic actuators which have attracted attention from an interdisciplinary audience of engineers and scientists. An enabling EAP technology is emerging which attempts to imitate the properties of natural muscle and which, as a result, can perform a...
Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
Learn How To Convert Web Data Into Web Knowledge

This text demonstrates how to extract knowledge by finding meaningful connections among data spread throughout the Web. Readers learn methods and algorithms from the fields of information retrieval, machine learning, and data mining which, when combined, provide a solid...

Agility by ARIS Business Process Management: Yearbook Business Process Excellence 2006/2007
Agility by ARIS Business Process Management: Yearbook Business Process Excellence 2006/2007
Agility and Execution – Organizational Success Through Flexible Business Processes

Only a company which is flexible, agile and responsive will be successful. The secret to success is agility, meaning the ability to quickly adapt company processes. Against this backdrop, IT is of particular importance as it is virtually the machine
...
The Design and Analysis of Efficient Learning Algorithms (ACM Doctoral Dissertation Award)
The Design and Analysis of Efficient Learning Algorithms (ACM Doctoral Dissertation Award)

Approaches to building machines that can learn from experience abound - from connectionist learning algorithms and genetic algorithms to statistical mechanics and a learning system based on Piaget's theories of early childhood development. This monograph describes results derived from the mathematically oriented framework of computational...

Machine Learning with R - Second Edition
Machine Learning with R - Second Edition

Key Features

  • Harness the power of R for statistical computing and data science
  • Explore, forecast, and classify data with R
  • Use R to apply common machine learning algorithms to real-world scenarios

Book Description

Machine learning, at its core, is concerned...

Digital Da Vinci: Computers in Music
Digital Da Vinci: Computers in Music

The Digital Da Vinci book series opens with the interviews of music mogul Quincy Jones, MP3 inventor Karlheinz Brandenburg, Tommy Boy founder Tom Silverman and entertainment attorney Jay L. Cooper. A strong supporter of science, technology, engineering and mathematics programs in schools, The Black Eyed Peas founding member will.i.am...

sendmail Desktop Reference
sendmail Desktop Reference
The sendmail program is a Mail Transport Agent (MTA). It accepts mail from Mail User Agents
(MUAs), mail users (humans), and other MTAs. It then delivers that mail to Mail Delivery Agents
(MDAs) on the local machine, or transports that mail to another MTA at another machine. The behavior
of sendmail is determined by its command line
...
unlimited object storage image
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy