Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Why Does E=mc2?: (And Why Should We Care?)
Why Does E=mc2?: (And Why Should We Care?)

The most accessible, entertaining, and enlightening explanation of the best-known physics equation in the world, as rendered by two of today’s leading scientists.

Professor Brian Cox and Professor Jeff Forshaw go on a journey to the frontier of 21st century science to consider the real meaning behind the iconic sequence of...

Social Network Data Analytics
Social Network Data Analytics

Social network analysis applications have experienced tremendous advances within the last few years due in part to increasing trends towards users interacting with each other on the internet. Social networks are organized as graphs, and the data on social networks takes on the form of massive streams, which are mined for a variety of...

Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making...

Advances in Data Sciences, Security and Applications: Proceedings of ICDSSA 2019 (Lecture Notes in Electrical Engineering)
Advances in Data Sciences, Security and Applications: Proceedings of ICDSSA 2019 (Lecture Notes in Electrical Engineering)
This book gathers the best papers presented at the International Conference on Data Sciences, Security and Applications (ICDSSA 2019), organized by Bharati Vidyapeeth’s College of Engineering, New Delhi, India, on 7–8 March 2019. The respective contributions present original research work, essential information, techniques and...
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Biomedical Image Analysis and Machine Learning Technologies: Applications and Techniques
Biomedical Image Analysis and Machine Learning Technologies: Applications and Techniques

Medical images are at the base of many routine clinical decisions and their influence continues to increase in many fields of medicine. Since the last decade, computers have become an invaluable tool for supporting medical image acquisition, processing, organization and analysis.

Biomedical Image Analysis and Machine Learning...

Data Algorithms: Recipes for Scaling Up with Hadoop and Spark
Data Algorithms: Recipes for Scaling Up with Hadoop and Spark

If you are ready to dive into the MapReduce framework for processing large datasets, this practical book takes you step by step through the algorithms and tools you need to build distributed MapReduce applications with Apache Hadoop or Apache Spark. Each chapter provides a recipe for solving a massive computational problem, such as...

Keras Reinforcement Learning Projects: 9 projects exploring popular reinforcement learning techniques to build self-learning agents
Keras Reinforcement Learning Projects: 9 projects exploring popular reinforcement learning techniques to build self-learning agents

A practical guide to mastering reinforcement learning algorithms using Keras

Key Features

  • Build projects across robotics, gaming, and finance fields, putting reinforcement learning (RL) into action
  • Get to grips with Keras and practice on real-world unstructured...
Machine Learning Algorithms: Popular algorithms for data science and machine learning, 2nd Edition
Machine Learning Algorithms: Popular algorithms for data science and machine learning, 2nd Edition

An easy-to-follow, step-by-step guide for getting to grips with the real-world application of machine learning algorithms

Key Features

  • Explore statistics and complex mathematics for data-intensive applications
  • Discover new developments in EM algorithm, PCA, and bayesian...
The Tao of Computing
The Tao of Computing
What should every citizen know about computers and computer technology? For better or worse, answers typically depend upon who is asked.

• Students commonly have a practical bent: How can one get the computer to perform specific tasks, why does a machine act the way it does, what is involved in getting computers to interact, and so
...
Hacker Debugging Uncovered (Uncovered series)
Hacker Debugging Uncovered (Uncovered series)

Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of...

Advances in Minimum Description Length: Theory and Applications (Neural Information Processing)
Advances in Minimum Description Length: Theory and Applications (Neural Information Processing)
The process of inductive inference—to infer general laws and principles from particular instances—is the basis of statistical modeling, pattern recognition, and machine learning. The Minimum Descriptive Length (MDL) principle, a powerful method of inductive inference, holds that the best explanation, given a limited set of observed...
unlimited object storage image
Result Page: 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy