Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
App Inventor 2
App Inventor 2

Yes, you can create your own apps for Android devices—and it’s easy to do. This extraordinary book introduces you to App Inventor 2, a powerful visual tool that lets anyone build apps. Learn App Inventor basics hands-on with step-by-step instructions for building more than a dozen fun projects, including a text answering...

Java Data Science Cookbook
Java Data Science Cookbook

Key Features

  • This book provides modern recipes in small steps to help an apprentice cook become a master chef in data science
  • Use these recipes to obtain, clean, analyze, and learn from your data
  • Learn how to get your data science applications to production and enterprise...
Flash Remoting: The Definitive Guide
Flash Remoting: The Definitive Guide
Flash Remoting MX lets developers easily integrate rich Macromedia Flash content with applications that are built using ColdFusion, ASP.NET, Java, PHP, or SOAP-based web services. The result is complex client/server applications that more closely resemble desktop applications than traditional web pages. Build applications that connect to a...
Windows Server 2008 Hyper-V Unleashed
Windows Server 2008 Hyper-V Unleashed
Hyper-V is Microsoft’s server virtualization technology built-in to Windows Server 2008.  Virtual Machine Manager 2008 is a System Center add-on that helps organizations better manage their virtual guest images, delegate administration and management, and even extract virtual images from existing physical and virtual servers.  This...
Achieving Extreme Performance with Oracle Exadata (Osborne ORACLE Press Series)
Achieving Extreme Performance with Oracle Exadata (Osborne ORACLE Press Series)

You are holding the first comprehensive book covering the Oracle Exadata Database Machine. You might be holding this book because of your desire to know more about exactly what this technology can do for you, but you and your fellow readers have come to this place from different starting points. You could be investigating the Exadata...

Probabilistic Modelling in Bioinformatics and Medical Informatics
Probabilistic Modelling in Bioinformatics and Medical Informatics

Probabilistic Modelling in Bioinformatics and Medical Informatics has been written for researchers and students in statistics, machine learning, and the biological sciences. The first part of this book provides a self-contained introduction to the methodology of Bayesian networks. The following parts demonstrate how these...

Artificial Intelligence for Big Data: Complete guide to automating Big Data solutions using Artificial Intelligence techniques
Artificial Intelligence for Big Data: Complete guide to automating Big Data solutions using Artificial Intelligence techniques

Build next-generation artificial intelligence systems with Java

Key Features

  • Implement AI techniques to build smart applications using Deeplearning4j
  • Perform big data analytics to derive quality insights using Spark MLlib
  • Create self-learning systems using...
Speech and Human-Machine Dialog (The International Series in Engineering and Computer Science)
Speech and Human-Machine Dialog (The International Series in Engineering and Computer Science)
The conjunction of several factors having occurred throughout the past
few years will make humans significantly change their behavior vis-à-vis machines.
In particular the use of speech technologies will become normal in
the professional domain, but also in everyday life. The performance of speech
recognition components
...
Heuristic and Optimization for Knowledge Discovery
Heuristic and Optimization for Knowledge Discovery
With the large amount of data stored by many organizations, capitalists have observed that this information is an intangible asset. Unfortunately, handling large databases is a very complex process and traditional learning techniques are expensive to use. Heuristic techniques provide much help in this arena, although little is known about heuristic...
Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
Augmented Vision Perception in Infrared: Algorithms and Applied Systems (Advances in Pattern Recognition)
Augmented Vision Perception in Infrared: Algorithms and Applied Systems (Advances in Pattern Recognition)
Spurred by security and safety challenges, research efforts in thermographic sensors have advanced greatly, resulting in better performance in remote surveillance, object recognition, guidance and so on.

 

This comprehensive survey provides a thorough account of the recent deployment of infrared sensors in modern applications of...

The Linux Command Line: A Complete Introduction
The Linux Command Line: A Complete Introduction

You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line.

The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way...

unlimited object storage image
Result Page: 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy