Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java for Data Science
Java for Data Science
Examine the techniques and Java tools supporting the growing field of data science About This Book Your entry ticket to the world of data science with the stability and power of Java Explore, analyse, and visualize your data effectively using easy-to-follow examples Make your Java applications more capable using machine learning Who This Book Is...
Scratch by Example: Programming for All Ages
Scratch by Example: Programming for All Ages
This is a book about learning the Scratch language so that you can use it in teaching and other instructional situations. The book explains the visual nature of the language, showing you how to write programs by dragging and dropping visual blocks representing common compute operations. 

Scratch is visual...
Harmony Search Algorithm: Proceedings of the 3rd International Conference on Harmony Search Algorithm (ICHSA 2017) (Advances in Intelligent Systems and Computing)
Harmony Search Algorithm: Proceedings of the 3rd International Conference on Harmony Search Algorithm (ICHSA 2017) (Advances in Intelligent Systems and Computing)

This book presents state-of-the-art technical contributions based around one of the most successful evolutionary optimization algorithms published to date: Harmony Search. Contributions span from novel technical derivations of this algorithm to applications in the broad fields of civil engineering, energy, transportation &...

Eigenstructure Control Algorithms: Applications to aircraft/rotorcraft handling qualities design (Control, Robotics and Sensors)
Eigenstructure Control Algorithms: Applications to aircraft/rotorcraft handling qualities design (Control, Robotics and Sensors)

Eigenstructure control involves modification of both the eigenvalues and eigenvectors of a system using feedback. Based on this key concept, algorithms are derived for the design of control systems using controller structures such as state feedback, output feedback, observer-based dynamic feedback, implicit and explicit...

Static and Dynamic Neural Networks: From Fundamentals to Advanced Theory
Static and Dynamic Neural Networks: From Fundamentals to Advanced Theory
With the evolution of our complex technological society and the introduction of new notions and innovative theoretical tools in the field of intelligent systems, the field of neural networks is undergoing an enormous evolution. These evolving and innovative theoretical tools are centered around the theory of soft computing, a theory that embodies...
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)

The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) to be the successor to the Data Encryption Standard. Rijndael was subsequently standardized as the Advanced Encryption Standard (AES), which is potentially the world’s most important block cipher. In...

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Categories for Software Engineering
Categories for Software Engineering

This book provides a gentle, software engineering oriented introduction to category theory. Assuming only a minimum of mathematical preparation, this book explores the use of categorical constructions from the point of view of the methods and techniques that have been proposed for the engineering of complex software systems: object-oriented...

Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Semantic Web Services: Theory, Tools and Applications
Semantic Web Services: Theory, Tools and Applications
Semantic Web is here to stay! This is not really a marketing campaign logo, but it is a truth that every year is becoming more and more relevant to the daily life of business world, industry and society. I do not know how it happened, but the last years, through our activities in the Special Interest Group on Semantic Web and Information Systems in...
Learning ClojureScript
Learning ClojureScript

Master the art of agile single page web application development with ClojureScript

About This Book

  • Set up interactive development workflows for the browser or Node.js thanks to the ClojureScript ecosystem
  • Learn the basics of interactive single page web app development taking advantage of...
Oxford Textbook of Philosophy of Psychiatry (International Perspectives in Philosophy and Psychiatry)
Oxford Textbook of Philosophy of Psychiatry (International Perspectives in Philosophy and Psychiatry)
The publication of the Oxford Textbook of Philosophy and Psychiatry marks a step forward in the practical interaction between philosophy and medicine, especially psychiatric medicine. Through the growth of teaching in Bioethics (as well as of research and publication), the overlap between philosophical...
Result Page: 110 109 108 107 106 105 104 103 102 101 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy