Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Early Roman Expansion into Italy: Elite Negotiation and Family Agendas
The Early Roman Expansion into Italy: Elite Negotiation and Family Agendas
This book presents a radical new interpretation of Roman expansion in Italy during the fourth and third centuries BCE. Nicola Terrenato argues that the process was accomplished by means of a grand bargain that was negotiated between the landed elites of central and southern Italy, while military conquest played a much smaller role than is...
Advanced Computational Methods for Knowledge Engineering: Proceedings of the 6th International Conference on Computer Science, Applied Mathematics and ... in Intelligent Systems and Computing)
Advanced Computational Methods for Knowledge Engineering: Proceedings of the 6th International Conference on Computer Science, Applied Mathematics and ... in Intelligent Systems and Computing)

This proceedings book contains 37 papers selected from the submissions to the 6th International Conference on Computer Science, Applied Mathematics and Applications (ICCSAMA 2019), which was held on 19–20 December, 2019, in Hanoi, Vietnam. The book covers theoretical and algorithmic as well as practical issues connected with...

Why We Fight: One Man's Search for Meaning Inside the Ring
Why We Fight: One Man's Search for Meaning Inside the Ring

A physical and philosophical mediation on why we are drawn to fight each other for sport, what happens to our bodies and brains when we do, and what it all means

Anyone with guts or madness in him can get hit by someone who knows how; it takes a different kind of madness, a more persistent
...

Understanding the Impact of INSET on Teacher Change in China
Understanding the Impact of INSET on Teacher Change in China

This pivot considers the impact of INSET courses on EFL teachers practicing under the national curriculum reform in China. Providing context-specific findings on the policy and implementation of INSET as well as its impact on teacher education initiatives in both China and similar contexts, it explores the limitations of one off...

Heidegger with Derrida: Being Written
Heidegger with Derrida: Being Written

Heidegger with Derrida: Being Written attempts, for the first time, to think Heidegger's philosophy through the lens of Derrida's logocentric thesis, according to which speech has, throughout the history of metaphysics, been given primacy over writing. The book offers a detailed account of Derrida's arguments about...

Warriors of Anatolia: A Concise History of the Hittites
Warriors of Anatolia: A Concise History of the Hittites
The Hittites in the Late Bronze Age became the mightiest military power in the Ancient Near East. Yet their empire was always vulnerable to destruction by enemy forces; their Anatolian homeland occupied a remote region, with no navigable rivers; and they were cut off from the sea. Perhaps most seriously, they suffered chronic...
The Social Meaning of Extra Money: Capitalism and the Commodification of Domestic and Leisure Activities (Dynamics of Virtual Work)
The Social Meaning of Extra Money: Capitalism and the Commodification of Domestic and Leisure Activities (Dynamics of Virtual Work)

Why do ordinary people who used to engage in domestic and leisure activities for free now try to make a profit from them? How and why do people commodify their free time? This book explores the marketization of blogging, cooking, craftwork, gardening, knitting, selling second-hand items, sexcamming, and more generally the economic...

Nomic Truth Approximation Revisited (Synthese Library)
Nomic Truth Approximation Revisited (Synthese Library)

This monograph presents new ideas in nomic truth approximation. It features original and revised papers from a (formal) philosopher of science who has studied the concept for more than 35 years.

Over the course of time, the author's initial ideas evolved. He discovered a way to generalize his first theory of nomic...

Fundamentals of Modern Electric Circuit Analysis and Filter Synthesis: A Transfer Function Approach
Fundamentals of Modern Electric Circuit Analysis and Filter Synthesis: A Transfer Function Approach
This textbook explains the fundamentals of electric circuits and uses the transfer function as a tool to analyze circuits, systems, and filters.  The author avoids the Fourier transform and three phase circuits, since these topics are often not taught in circuits courses.  General transfer functions for low pass, high pass, band pass...
Serverless Applications with Node.js: Using AWS Lambda and Claudia.js
Serverless Applications with Node.js: Using AWS Lambda and Claudia.js
Summary

Serverless Applications with Node.js walks you through building serverless apps on AWS using JavaScript. Inside, you'll discover what Claudia.js brings to the table as you build and deploy a scalable event-based serverless application, based around a pizzeria that's fully integrated with AWS
...
Data-intensive Systems: Principles and Fundamentals using Hadoop and Spark (Advanced Information and Knowledge Processing)
Data-intensive Systems: Principles and Fundamentals using Hadoop and Spark (Advanced Information and Knowledge Processing)
Data-intensive systems are a technological building block supporting Big Data and Data Science applications.This book familiarizes readers with core concepts that they should be aware of before continuing with independent work and the more advanced technical reference literature that dominates the current landscape.

...
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles

Your one-stop guide to learning and implementing artificial neural networks with Keras effectively

Key Features

  • Design and create neural network architectures on different domains using Keras
  • Integrate neural network models in your applications using this highly practical...
unlimited object storage image
Result Page: Previous 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy