Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles

Your one-stop guide to learning and implementing artificial neural networks with Keras effectively

Key Features

  • Design and create neural network architectures on different domains using Keras
  • Integrate neural network models in your applications using this highly practical...
Mastering Ext JS
Mastering Ext JS

In this book you'll learn to develop a complete application with ExtJS. Enhance your existing skills and get a better grasp of the JavaScript framework to create advanced Internet applications.

Overview

  • Build an application with Ext JS from scratch
  • Learn expert tips and...
Proceedings of the Tiangong-2 Remote Sensing Application Conference: Technology, Method and Application (Lecture Notes in Electrical Engineering)
Proceedings of the Tiangong-2 Remote Sensing Application Conference: Technology, Method and Application (Lecture Notes in Electrical Engineering)
This book gathers a selection of peer-reviewed papers presented at the Tiangong-2 Data Utilization Conference, which was held in Beijing, China, in December 2018. As the first space laboratory in China, Tiangong-2 carries 3 new types of remote sensing payloads – the Wide-band Imaging Spectrometer (WIS), Three-dimensional Imaging...
Microsoft  Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant
Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant

Delivering immediate answers for the day-to-day administration of ISA Server 2004, this guide offers the focused, straightforward information you need to solve problems and get the job done.

Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of ISA...

Applications of Information Systems to Homeland Security And Defense
Applications of Information Systems to Homeland Security And Defense
A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems’...
Advanced .NET Remoting, Second Edition
Advanced .NET Remoting, Second Edition

With the arrival of .NET remoting, any programmer who wants to work with distributed objects can benefit from Advanced .NET Remoting, a solid tour of basic and expert techniques for working with distributed code on Microsoft's newest platform.

This title's concise, code-centered approach, backed up by judicious...

Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

Adaptive Business Intelligence
Adaptive Business Intelligence
From the reviews of the first edition: 

"In this book the authors explain the science and application of numerous prediction and optimization techniques as well as how these concepts can be used to develop adaptive decision-making systems. The book is suitable for business and IT managers who make decisions in complex industrial and...

High Performance Computing on Vector Systems 2007
High Performance Computing on Vector Systems 2007
The book presents the state-of-the-art in high performance computing and simulation on modern supercomputer architectures. It covers trends in hardware and software development in general and specifically the future of vector-based systems and heterogeneous architectures. The application contributions cover computational fluid dynamics,...
Blind Image Deconvolution: Theory and Applications
Blind Image Deconvolution: Theory and Applications
Blind image deconvolution is constantly receiving increasing attention from the academic as well the industrial world due to both its theoretical and practical implications. The field of blind image deconvolution has several applications in different areas such as image restoration, microscopy, medical imaging, biological imaging, remote sensing,...
Developing Applications for the Cloud on the Microsoft Windows Azure Platform (Patterns & Practices)
Developing Applications for the Cloud on the Microsoft Windows Azure Platform (Patterns & Practices)

Windows Azure is a highly scalable, robust, and cost-effective solution for the deployment of applications and services—for organizations and enterprises of all sizes, and in all types of markets. My task at Microsoft is to ensure that developers can help these organizations and enterprises to achieve their goals by quickly and easily...

LabVIEW Graphical Programming Cookbook
LabVIEW Graphical Programming Cookbook

For advanced LabVIEW users, this book is packed with practical recipes designed to immerse you in graphical programming, covering everything from animation creation to working with external applications.

Overview

  • Learn how to manage data flow
  • Demonstrate common coding practices
  • ...
unlimited object storage image
Result Page: 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy