Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Numerical Techniques in Electromagnetics with MATLAB
Numerical Techniques in Electromagnetics with MATLAB

Despite the dramatic growth in the availability of powerful computer resources, the EM community lacks a comprehensive text on the computational techniques used to solve EM problems. The first edition of Numerical Techniques in Electromagnetics filled that gap and became the reference of choice for thousands of engineers,...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Python Social Media Analytics: Analyze and visualize data from Twitter, YouTube, GitHub, and more
Python Social Media Analytics: Analyze and visualize data from Twitter, YouTube, GitHub, and more

Leverage the power of Python to collect, process, and mine deep insights from social media data

About This Book

  • Acquire data from various social media platforms such as Facebook, Twitter, YouTube, GitHub, and more
  • Analyze and extract actionable insights from your social data using various...
3D Computer Vision: Efficient Methods and Applications (X.media.publishing)
3D Computer Vision: Efficient Methods and Applications (X.media.publishing)

This book provides an introduction to the foundations of three-dimensional computer vision and describes recent contributions to the field. Geometric methods include linear and bundle adjustment based approaches to scene reconstruction and camera calibration, stereo vision, point cloud segmentation, and pose estimation of rigid, articulated, and...

The Success of Open Source
The Success of Open Source

Much of the innovative programming that powers the Internet, creates operating systems, and produces software is the result of "open source" code, that is, code that is freely distributed--as opposed to being kept secret--by those who write it. Leaving source code open has generated some of the most sophisticated developments in...

Robotics (Intelligent Systems, Control and Automation: Science and Engineering)
Robotics (Intelligent Systems, Control and Automation: Science and Engineering)

This supplementary introductory tutorial treats the following subjects: the basic characteristics of industrial robot mechanisms; the pose and movement of an object, which are described by homogenous transformation matrices; a geometric model of robot mechanism; a short introduction into kinematics and dynamics of robots; robot sensors and the...

Dynamic Secrets in Communication Security
Dynamic Secrets in Communication Security

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in...

Human Motion - Understanding, Modeling, Capture and Animation: Second Workshop, HumanMotion 2007, Rio de Janeiro, Brazil, October 20, 2007
Human Motion - Understanding, Modeling, Capture and Animation: Second Workshop, HumanMotion 2007, Rio de Janeiro, Brazil, October 20, 2007

This book constitutes the refereed proceedings of the Second Workshop on Human Motion, HumanMotion 2007, held in Rio de Janeiro, Brazil October 2007 in conjunction with ICCV 2007. The 22 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on motion capture and...

Chemical Analysis of Antibiotic Residues in Food
Chemical Analysis of Antibiotic Residues in Food

An insightful exploration of the key aspects concerning the chemical analysis of antibiotic residues in food

The presence of excess residues from frequent antibiotic use in animals is not only illegal, but can pose serious health risks by contaminating products for human consumption such as meat and milk. Chemical...

Face Processing: Advanced Modeling and Methods
Face Processing: Advanced Modeling and Methods
As one of the most important applications of image analysis and understanding, face recognition has recently received significant attention, especially during the past 10 years. There are at least two reasons for this trend: the first is the wide range of commercial and law-enforcement applications, and the second is the availability of feasible...
Making Things See: 3D vision with Kinect, Processing, Arduino, and MakerBot (Make: Books)
Making Things See: 3D vision with Kinect, Processing, Arduino, and MakerBot (Make: Books)

This detailed, hands-on guide provides the technical and conceptual information you need to build cool applications with Microsoft’s Kinect, the amazing motion-sensing device that enables computers to see. Through half a dozen meaty projects, you’ll learn how to create gestural interfaces for software, use motion capture...

Result Page: 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy