Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python 3 Text Processing with NLTK 3 Cookbook
Python 3 Text Processing with NLTK 3 Cookbook

Over 80 practical recipes on natural language processing techniques using Python's NLTK 3.0

About This Book

  • Break text down into its component parts for spelling correction, feature extraction, and phrase transformation
  • Learn how to do custom sentiment analysis and named entity...
Genetic Fuzzy Systems
Genetic Fuzzy Systems

In recent years, a great number of publications have explored the use of genetic algorithms as a tool for designing fuzzy systems. Genetic Fuzzy Systems explores and discusses this symbiosis of evolutionary computation and fuzzy logic. The book summarizes and analyzes the novel field of genetic fuzzy systems, paying special attention to...

Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Statistical Approach to Quantum Field Theory: An Introduction (Lecture Notes in Physics)
Statistical Approach to Quantum Field Theory: An Introduction (Lecture Notes in Physics)

Over the past few decades the powerful methods of statistical physics and Euclidean quantum field theory have moved closer together, with common tools based on the use of path integrals. The interpretation of Euclidean field theories as particular systems of statistical physics has opened up new avenues for understanding strongly coupled...

Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

SQLite (Developer's Library)
SQLite (Developer's Library)

SQLite is a small, fast, embeddable database. What makes it popular is the combination of the database engine and interface into a single library as well as the ability to store all the data in a single file. Its functionality lies between MySQL and PostgreSQL, however it is faster than both databases.

In...

Numerical Python: A Practical Techniques Approach for Industry
Numerical Python: A Practical Techniques Approach for Industry

Numerical Python by Robert Johansson shows you how to leverage the numerical and mathematical modules in Python and its Standard Library as well as popular open source numerical Python packages like NumPy, FiPy, matplotlib and more to numerically compute solutions and mathematically model...

Microsoft Azure Security Center (IT Best Practices - Microsoft Press)
Microsoft Azure Security Center (IT Best Practices - Microsoft Press)
Welcome to Azure Security Center, Third Edition—a book that was developed together with the Azure Security Center product group to provide in-depth information about Azure Security Center and Azure Defender, to demonstrate best practices based on real-life experience with the product in different environments.
...
Learning Data Mining with Python
Learning Data Mining with Python

Harness the power of Python to analyze data and create insightful predictive models

About This Book

  • Learn data mining in practical terms, using a wide variety of libraries and techniques
  • Learn how to find, manipulate, and analyze data using Python
  • Step-by-step instructions...
The Art of Paper Cutting
The Art of Paper Cutting

Papercutting is an ancient, elegant art that dates almost as far back as the creation of paper itself. In today’s multicultural world, papercutting embraces any...

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human...

Pro Python
Pro Python

You’ve learned the basics of Python, but how do you take your skills to the next stage? Even if you know enough to be productive, there are a number of features that can take you to the next level in Python. Pro Python, Second Edition explores concepts and features normally left to experimentation, allowing you to be even more...

unlimited object storage image
Result Page: 295 294 293 292 291 290 289 288 287 286 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy