Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
An Invitation to Computer Science, 5th Edition
An Invitation to Computer Science, 5th Edition

This text is intended for a one-semester introductory course in computer science. It presents a breadth-first overview of the discipline that assumes no prior background in computer science, programming, or mathematics. It is appropriate for use in a service course for students not majoring in computer science. It is also appropriate...

Hands-On Deep Learning for Images with TensorFlow: Build intelligent computer vision applications using TensorFlow and Keras
Hands-On Deep Learning for Images with TensorFlow: Build intelligent computer vision applications using TensorFlow and Keras

Explore TensorFlow's capabilities to perform efficient deep learning on images

Key Features

  • Discover image processing for machine vision
  • Build an effective image classification system using the power of CNNs
  • Leverage TensorFlow's capabilities to...
Intelligent Control: A Hybrid Approach Based on Fuzzy Logic, Neural Networks and Genetic Algorithms (Studies in Computational Intelligence)
Intelligent Control: A Hybrid Approach Based on Fuzzy Logic, Neural Networks and Genetic Algorithms (Studies in Computational Intelligence)

Intelligent Control considers non-traditional modelling and control approaches to nonlinear systems. Fuzzy logic, neural networks and evolutionary computing techniques are the main tools used. The book presents a modular switching fuzzy logic controller where a PD-type fuzzy controller is executed first followed by a PI-type...

Using Samba, Second Edition
Using Samba, Second Edition
Using Samba, Second Edition is a comprehensive guide to Samba administration. This new edition covers all versions of Samba from 2.0 to 2.2, including selected features from an alpha version of 3.0, as well as the SWAT graphical configuration tool. Updated for Windows 2000, ME, and XP, the book also explores...
Windows Server 2003 Pocket Administrator
Windows Server 2003 Pocket Administrator
Twenty years ago, when most computers were mainframes
or minicomputers, operators and administrators had
scheduled, specific tasks they needed to perform on an
ongoing basis. Each time a task was performed, they had
to make note of the time and write their initials in a
logbook to demonstrate when the task was performed...
Network+ Exam Prep 2 (Exam Prep N10-003)
Network+ Exam Prep 2 (Exam Prep N10-003)

Attention Network+ Candidates: Stop spending valuable study time sorting through confusing study aids. Network + Exam Prep 2 is the ultimate self-study guide for the Network + exam. Featuring exercises, self-assessments, study strategies, exam tips and notes, this comprehensive guide will help you understand the concepts behind...

HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Instructional Engineering in Networked Environments (Tech Training Series)
Instructional Engineering in Networked Environments (Tech Training Series)
A Dynamic, Research-Based Approach to Knowledge Management

In this book, Gilbert Paquette–an internationally recognized expert in the field of technology-based training–offers IT professionals, trainers, and consultants a revolutionary method for going beyond simple information management. Instructional Engineering in Networked...

Handbook of Research on Mobile Multimedia
Handbook of Research on Mobile Multimedia
The demand for mobile access to data no matter where the data is stored and where the user happens to be, in addition to the explosive growth of the Internet and the rising popularity of mobile devices, are among the factors that have created a dynamic business environment, where companies are competing to provide customers access to information...
Principles of Data Mining (Adaptive Computation and Machine Learning)
Principles of Data Mining (Adaptive Computation and Machine Learning)

The growing interest in data mining is motivated by a common problem across disciplines: how does one store, access, model, and ultimately describe and understand very large data sets? Historically, different aspects of data mining have been addressed independently by different disciplines. This is the first truly...

C++ Neural Networks and Fuzzy Logic
C++ Neural Networks and Fuzzy Logic

The number of models available in neural network literature is quite large. Very often the treatment is mathematical and complex. This book provides illustrative examples in C++ that the reader can use as a basis for further experimentation. A key to learning about neural networks to appreciate their inner workings is to experiment. Neural...

Algorithmic Aspects of Wireless Sensor Networks: Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007
Algorithmic Aspects of Wireless Sensor Networks: Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007
This book constitutes the reviewed proceedings of the Third International Workshop on Algorithmic Aspects of Wireless Sensor Networks, ALGOSENSORS 2007, held in Wroclaw, Poland, July 14, 2007, in association with ICALP 2007.

The 11 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 26...

unlimited object storage image
Result Page: 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy