Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
An Introduction to Neural Networks
An Introduction to Neural Networks
Covers: artificial neurons as models of their real counterparts; the geometry of network action in pattern space; gradient descent methods, including back-propagation; associative memory and Hopfield nets; and self-organization and feature maps.

This book grew out of a set of course notes for a neural networks module given as part of a
...
Interconnection Noise in VLSI Circuits
Interconnection Noise in VLSI Circuits
Interconnections are a most important design issue nowadays. Trends in the microelectronic industry are leading to unwanted interconnect effects, especially noise, becoming more important. This increasing importance is mainly due to three reasons: increasing integration, increasing signal frequency spectrum components, and increasing complexity....
Agile IT Security Implementation Methodology
Agile IT Security Implementation Methodology

Agile methodologies attack risk at its core. To identify risk early and often is the premise of agile security. Risk comes in many forms. Organizations face security threats every day. Risks are in the delivery and maintenance of the countermeasures. Agile IT Security focuses on the details of the steps in delivering and maintaining...

Thoughtful Machine Learning: A Test-Driven Approach
Thoughtful Machine Learning: A Test-Driven Approach

Learn how to apply test-driven development (TDD) to machine-learning algorithms—and catch mistakes that could sink your analysis. In this practical guide, author Matthew Kirk takes you through the principles of TDD and machine learning, and shows you how to apply TDD to several machine-learning algorithms, including Naive...

Engineering Design, Planning, and Management
Engineering Design, Planning, and Management

Engineering Design, Planning and Management covers engineering design methodology with an interdisciplinary approach, concise discussions, and a visual format. The book covers the product design process in the context of both established companies and entrepreneurial start-ups. Readers will discover the usefulness of the design process...

Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Pharamaceutical Parallel Trade in the Uk
Pharamaceutical Parallel Trade in the Uk

Parallel trade in pharmaceuticals within the EU involves the legal repacking and reselling of genuine medicines and dates back to the 1970s when a number of pharmacists realized that drug prices varied significantly between member states. By 2002, the UK market for parallel-distributed pharmaceuticals represented £1,300 million. It is...

Information Resources in Toxicology, Fourth Edition
Information Resources in Toxicology, Fourth Edition
This latest version of Information Resources in Toxicology (IRT) continues a tradition established in 1982 with the publication of the first edition in presenting an extensive itemization, review, and commentary on the information infrastructure of the field. This book is a unique wide-ranging, international, annotated bibliography and compendium...
Continuous Delivery with Visual Studio ALM  2015
Continuous Delivery with Visual Studio ALM 2015

This book is the authoritative source on implementing Continuous Delivery practices using Microsoft’s Visual Studio and TFS 2015. Microsoft MVP authors Mathias Olausson and Jakob Ehn translate the theory behind this methodology and show step by step how to implement Continuous Delivery in a real world environment.

Building...

Cardiogenic Shock (Contemporary Cardiology)
Cardiogenic Shock (Contemporary Cardiology)

Leading world authorities drawn from cardiology, surgery, pediatrics, internal medicine, and basic science comprehensively survey the diagnostic, therapeutic, and prognostic aspects of cardiogenic shock. These experts describe the different scenarios leading to cardiogenic shock, the ways to diagnose their causes, the unique therapeutic...

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Online Game Pioneers at Work
Online Game Pioneers at Work
In this groundbreaking collection of 15 interviews, successful founders of entertainment software companies reflect on their challenges and how they survived. You will learn of the strategies, the sacrifices, the long hours, the commitment, and the dedication to quality that led to their successes but also of the toll that this incredibly...
unlimited object storage image
Result Page: 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy