Home | Amazing | Today | Tags | Publishers | Years | Search 
Quantum Computing Solutions: Solving Real-World Problems Using Quantum Computing and Algorithms
Quantum Computing Solutions: Solving Real-World Problems Using Quantum Computing and Algorithms
This chapter gives an overview of quantum solutions. You will see how quantum computing can be applied in real life. The problem and solutions are presented with the solution benefits. The solution benefits are automation, cost reduction and profit improvements, efficiency improvement, and defect reduction. The solutions...
Machine Learning with Python: The Definitive Tool to Improve Your Python Programming and Deep Learning to Take You to The Next Level of Coding and Algorithms Optimization
Machine Learning with Python: The Definitive Tool to Improve Your Python Programming and Deep Learning to Take You to The Next Level of Coding and Algorithms Optimization

Machine learning is rapidly changing the world, from diverse types of applications and research pursued in industry and academia. 

Machine learning is affecting every part of your daily life. From voice assistants using NLP and machine learning to make appointments, check your calendar, and play music,...

Data Parallel C++: Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL
Data Parallel C++: Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL

Learn how to accelerate C++ programs using data parallelism. This open access book enables C++ programmers to be at the forefront of this exciting and important new development that is helping to push computing to new levels. It is full of practical advice, detailed explanations, and code examples to illustrate key topics. 

...
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals

The need for every professional to have a solid presence on the Internet is more important than ever before. Having a presence beyond an email account, such as a custom web page or web application, usually requires a clumsy assortment of outside services or hiring a dedicated administrator. Thus it is more sensible for the...

Azure Arc-Enabled Data Services Revealed: Early First Edition Based on Public Preview
Azure Arc-Enabled Data Services Revealed: Early First Edition Based on Public Preview
For many years, major software companies like Microsoft and Oracle made previously unfathomable profits by selling enterprise software that companies would buy and operate in their own data centers. In the last 20 years, we have seen a gradual transition to a wide variety of software and services models – SaaS, IaaS, PaaS...
Practical R 4: Applying R to Data Manipulation, Processing and Integration
Practical R 4: Applying R to Data Manipulation, Processing and Integration

Get started with an accelerated introduction to the R ecosystem, programming language, and tools including R script and RStudio. Utilizing many examples and projects, this book teaches you how to get data into R and how to work with that data using R. Once grounded in the fundamentals, the rest of Practical R...

Beginning Robotics with Raspberry Pi and Arduino: Using Python and OpenCV
Beginning Robotics with Raspberry Pi and Arduino: Using Python and OpenCV

Learn how to use a Raspberry Pi in conjunction with an Arduino to build a basic robot with advanced capabilities. Getting started in robotics does not have to be difficult. This book is an insightful and rewarding introduction to robotics and a catalyst for further directed study. 

Fully updated...

Practical System Programming with C: Pragmatic Example Applications in Linux and Unix-Based Operating Systems
Practical System Programming with C: Pragmatic Example Applications in Linux and Unix-Based Operating Systems

This book teaches system programming with the latest versions of C through a set of practical examples and problems. It covers the development of a handful of programs, implementing efficient coding examples.  

Practical System Programming with C contains three main parts: getting your hands dirty with...

Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
For many years the RHCE from Red Hat has been based on managing services on a single Red Hat host. The big question is: how many RHCEs manage just a single host? With that in mind, Red Hat has updated the exam and training to support Ansible, allowing you to learn to manage many hosts.

Ansible is a configuration
...
Computer Vision with Maker Tech: Detecting People With a Raspberry Pi, a Thermal Camera, and Machine Learning
Computer Vision with Maker Tech: Detecting People With a Raspberry Pi, a Thermal Camera, and Machine Learning

Harness the untapped potential of combining a decentralized Internet of Things (IoT) with the ability to make predictions on real-world fuzzy data. This book covers the theory behind machine learning models and shows you how to program and assemble a voice-controlled security.

You’ll learn the differences between...

Practical Rust Web Projects: Building Cloud and Web-Based Applications
Practical Rust Web Projects: Building Cloud and Web-Based Applications

Go beyond the basics of Rust and build web and serverless cloud applications. The applications explained in this practical book include web sites, RESTful APIs, a real-time web chat application, and frontend application with WebAssembly. Each chapter is organized in the following format: what this kind of application looks...

Authentication and Access Control: Practical Cryptography Methods and Tools
Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most notably in communications between users, servers, and devices. Unfortunately, this has led to many security challenges and problems. Recent examples include password leakage on large social network sites and defacement of websites. It is, therefore,...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy