Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bayesian Reasoning and Machine Learning
Bayesian Reasoning and Machine Learning
We live in a world that is rich in data, ever increasing in scale. This data comes from many di erent sources in science (bioinformatics, astronomy, physics, environmental monitoring) and commerce (customer databases, nancial transactions, engine monitoring, speech recognition, surveillance, search). Possessing the knowledge as to...
Handbook of Asynchronous Machines with Variable Speed (ISTE)
Handbook of Asynchronous Machines with Variable Speed (ISTE)

This handbook deals with the asynchronous machine in its close environment. It was born from a reflection on this electromagnetic converter whose integration in industrial environments takes a wide part. Previously this type of motor operated at fixed speed, from now on it has been integrated more and more in processes at variable speed. For...

TIBCO Spotfire for Developers
TIBCO Spotfire for Developers

Spotfire can give your organization the competitive edge through better analysis and visual presentation of business intelligence and this book will show you how. A guided tour of all the essential features of Spotfire.

Overview

  • Install a development environment on your own desktop/laptop
  • A...
Mastering .NET Machine Learning
Mastering .NET Machine Learning

About This Book

  • Based on .NET framework 4.6.1, includes examples on ASP.NET Core 1.0
  • Set up your business application to start using machine learning techniques
  • Familiarize the user with some of the more common .NET libraries for machine learning
  • Implement...
Resource-Adaptive Cognitive Processes (Cognitive Technologies)
Resource-Adaptive Cognitive Processes (Cognitive Technologies)

This book investigates the adaptation of cognitive processes to limited resources. The central topics of this book are heuristics considered as results of the adaptation to resource limitations, through natural evolution in the case of humans, or through artificial construction in the case of computational systems; the construction and...

Handbook of Machine and Computer Vision: The Guide for Developers and Users
Handbook of Machine and Computer Vision: The Guide for Developers and Users

The second edition of this accepted reference work has been updated to reflect the rapid developments in the field and now covers both 2D and 3D imaging.
Written by expert practitioners from leading companies operating in machine vision, this one-stop handbook guides readers through all aspects of image acquisition and image
...

Learn Unity ML-Agents - Fundamentals of Unity Machine Learning: Incorporate new powerful ML algorithms such as Deep Reinforcement Learning for games
Learn Unity ML-Agents - Fundamentals of Unity Machine Learning: Incorporate new powerful ML algorithms such as Deep Reinforcement Learning for games

Transform games into environments using machine learning and Deep learning with Tensorflow, Keras, and Unity

Key Features

  • Learn how to apply core machine learning concepts to your games with Unity
  • Learn the Fundamentals of Reinforcement Learning and Q-Learning and apply...
Obsessed by a Dream: The Physicist Rolf Widerøe – a Giant in the History of Accelerators (Springer Biographies)
Obsessed by a Dream: The Physicist Rolf Widerøe – a Giant in the History of Accelerators (Springer Biographies)

This Open Access biography chronicles the life and achievements of the Norwegian engineer and physicist Rolf Widerøe. Readers who meet him in the pages of this book will wonder why he isn't better known. 

The first of Widerøe's many pioneering contributions in the field of accelerator physics was the
...
Mac OS X Security
Mac OS X Security
Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of...
Arabic Computational Morphology: Knowledge-based and Empirical Methods (Text, Speech and Language Technology)
Arabic Computational Morphology: Knowledge-based and Empirical Methods (Text, Speech and Language Technology)
The morphology of Arabic poses special challenges to computational natural language processing systems. The exceptional degree of ambiguity in the writing system, the rich morphology, and the highly complex word formation process of roots and patterns all contribute to making computational approaches to Arabic very challenging. Indeed many...
Handbook of Granular Computing
Handbook of Granular Computing
Although the notion is a relatively recent one, the notions and principles of Granular Computing (GrC) have appeared in a different guise in many related fields including granularity in Artificial Intelligence, interval computing, cluster analysis, quotient space theory and many others. Recent years have witnessed a renewed and expanding interest...
High-Level Data Fusion
High-Level Data Fusion
Master cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and...
unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy