Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner

Build distributed applications that resolve data ownership issues when working with transactions between multiple parties

Key Features

  • Explore a perfect balance between theories and hands-on activities
  • Discover popular Blockchain use cases such as Bitcoin
  • ...
The LTE / SAE Deployment Handbook
The LTE / SAE Deployment Handbook

Describing the essential aspects that need to be considered during the deployment and operational phases of 3GPP LTE/SAE networks, this book gives a complete picture of LTE systems, as well as providing many examples from operational networks. It demystifies the structure, functioning, planning and measurements of both the radio and core...

Challenges in Social Network Research: Methods and Applications (Lecture Notes in Social Networks)
Challenges in Social Network Research: Methods and Applications (Lecture Notes in Social Networks)

The book includes both invited and contributed chapters dealing with advanced methods and theoretical development for the analysis of social networks and applications in numerous disciplines. Some authors explore new trends related to network measures, multilevel networks and clustering on networks, while other contributions deepen...

Practical Computer Vision Applications Using Deep Learning with CNNs: With Detailed Examples in Python Using TensorFlow and Kivy
Practical Computer Vision Applications Using Deep Learning with CNNs: With Detailed Examples in Python Using TensorFlow and Kivy
Deploy deep learning applications into production across multiple platforms. You will work on computer vision applications that use the convolutional neural network (CNN) deep learning model and Python. This book starts by explaining the traditional machine-learning pipeline, where you will...
Hands-On Computer Vision with Julia: Build complex applications with advanced Julia packages for image processing, neural networks, and Artificial Intelligence
Hands-On Computer Vision with Julia: Build complex applications with advanced Julia packages for image processing, neural networks, and Artificial Intelligence

Explore the various packages in Julia that support image processing and build neural networks for video processing and object tracking.

Key Features

  • Build a full-fledged image processing application using JuliaImages
  • Perform basic to advanced image and video stream...
Programming with Objects: A Comparative Presentation of Object Oriented Programming with C++ and Java
Programming with Objects: A Comparative Presentation of Object Oriented Programming with C++ and Java
This resource is designed as a text for educational programs in advanced programming and as a reference for professionals implementing Web- and Internet-based applications.

Programming with Object-Oriented Programming with C++ and Java, a comparative presentation of object-oriented programming with two of the most popular...

Quantitative MRI of the Brain: Measuring Changes Caused by Disease
Quantitative MRI of the Brain: Measuring Changes Caused by Disease

This book was conceived one balmy March evening on the banks of the river Brisbane, in Queensland, Australia, where I had just arrived for a sabbatical, and it became clear that the traditions of measurement science and MRI should meet. The notion of a guide, a cook-book, for quantitative MRI (qMR) techniques took seed, and attained its own...

Django: Web Development with Python
Django: Web Development with Python

About This Book

  • Explore the best practices to develop applications of a superior quality with Django framework
  • Unravel the common problems of web development in Django
  • This course teaches you major Django functions and will help you improve your skills by developing models, forms, views, and...
Adaptive Filters Theory and Applications
Adaptive Filters Theory and Applications

Adaptive filtering is an advanced and growing field in signal processing. A filter is a transmission network used in electronic circuits for the selective enhancement or reduction of specified components of an input signal. Filtering is achieved by selectively attenuating those components of the input signal which are undesired, relative to...

Place and Identity: The Performance of Home (Routledge Focus on Housing and Philosophy)
Place and Identity: The Performance of Home (Routledge Focus on Housing and Philosophy)

The UK is experiencing a housing crisis unlike any other. Homelessness is on the increase and more people are at the mercy of landlords due to unaffordable housing. Place and Identity: Home as Performance highlights that the meaning of home is not just found within the bricks and mortar; it is constructed from the network of...

Practical Security: Simple Practices for Defending Your Systems
Practical Security: Simple Practices for Defending Your Systems

Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and...

Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm (Intelligent Systems Reference Library)
Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm (Intelligent Systems Reference Library)

This book discusses the evolution of future-generation technologies through the Internet of things, bringing together all the related technologies on a single platform to offer valuable insights for undergraduate and postgraduate students, researchers, academics and industry practitioners.

The book uses data, network...

Result Page: 367 366 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy