Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mathematical Models of Spoken Language
Mathematical Models of Spoken Language
Humans use language to convey meaningful messages to each other. Linguistic competence consists in the ability to express meaning reliably, not simply to obtain faithful lexical transcriptions. This invaluable reference tool is the product of many years' experience and research on language and speech technology. It presents the motivations for,...
The Hammer of Witches: A Complete Translation of the Malleus Maleficarum
The Hammer of Witches: A Complete Translation of the Malleus Maleficarum
The Malleus Maleficarum, first published in 1486-7, is the standard medieval text on witchcraft and it remained in print throughout the early modern period. Its descriptions of the evil acts of witches and the ways to exterminate them continue to contribute to our knowledge of early modern law, religion and society. Mackay's highly acclaimed...
Knowledge-Free and Learning-Based Methods in Intelligent Game Playing
Knowledge-Free and Learning-Based Methods in Intelligent Game Playing

The book is focused on the developments and prospective challenging problems in the area of mind game playing (i.e. playing games that require mental skills) using Computational Intelligence (CI) methods, mainly neural networks, genetic/evolutionary programming and reinforcement learning. The majority of discussed game playing ideas were...

Arduino in Action
Arduino in Action
Summary

Arduino in Action is a hands-on guide to prototyping and building electronics using the Arduino platform. Suitable for both beginners and advanced users, this easy-to-follow book begins with the basics and then systematically guides you through projects ranging from your first blinking LED through
...
Raspberry Pi Embedded Projects Hotshot
Raspberry Pi Embedded Projects Hotshot

This book is targeted towards beginners and intermediate designers of mechatronic systems and embedded system design. Some familiarity with the Raspberry Pi and Python programming is preferred but not required.

The Raspberry Pi is a quaint example of technological innovations that come by once every two or three decades and set off...

Introduction to Aircraft Structural Analysis (Elsevier Aerospace Engineering)
Introduction to Aircraft Structural Analysis (Elsevier Aerospace Engineering)

During my experience of teaching aircraft structures, I have felt the need for a textbook written specifically for students of aeronautical engineering. Although there have been a number of excellent books written on the subject, they are now either out of date or too specialized in content to fulfill the requirements of an...

Photoshop Down & Dirty Tricks for Designers
Photoshop Down & Dirty Tricks for Designers

Corey Barker, Executive Producer of PlanetPhotoshop.com and one of the Photoshop Guys of Photoshop User TV, brings you this handy and inspiring volume in the Down & Dirty Tricks series. Yes, this book is an insane collection of some of the most mind-blowing Photoshop effects you’ve ever seen in one place. Ever wonder how that movie...

An Introduction to Analog and Digital Communications
An Introduction to Analog and Digital Communications
An introductory course on analog and digital communications is fundamental to the undergraduate program in electrical engineering. This course is usually offered at the junior level. Typically, it is assumed that the student has a background in calculus, electronics, signals and systems, and possibly probability theory.

...
T-SQL in One Hour a Day, Sams Teach Yourself
T-SQL in One Hour a Day, Sams Teach Yourself
Many excellent books about T-SQL are available, so how is this one different? In talking to the many people I meet in my travels around the country, I have heard one common complaint. Instead of the host of wonderful books available to expert database administrators (DBAs), most SQL Server readers yearn for a book targeted toward the...
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Queueing Theory with Applications to Packet Telecommunication
Queueing Theory with Applications to Packet Telecommunication
Soon after Samuel Morse’s telegraphing device led to a deployed electrical
telecommunications system in 1843, waiting lines began to form by those
wanting to use the system. At this writing queueing is still a significant factor in
designing and operating communications services, whether they are provided
over the Internet
...
Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
unlimited object storage image
Result Page: 98 97 96 95 94 93 92 91 90 89 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy