Combining solid theoretical discussions with practical design examples, this book is an essential reference on developing RF and microwave switchmode power amplifiers.
Digital Signal Processing, Second Edition enables electrical engineers and technicians in the fields of biomedical, computer, and electronics engineering to master the essential fundamentals of DSP principles and practice.
Authors Jim Jeffers and James Reinders spent two years helping educate customers about the prototype and pre-production hardware before Intel introduced the first Intel Xeon Phi coprocessor.
Implement real-world machine learning in a microservices architecture as well as design, build, and deploy intelligent microservices systems using examples and case studiesPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesDesign, build, and run microservices systems that utilize the full potential of machine learningDiscover the latest models and techniques for combining microservices and machine learning to create scalable systemsImplement machine learning in microservices architecture using open source applications with pros and consBook DescriptionWith the rising need for agile development and very short time-to-market system deployments, incorporating machine learning algorithms into decoupled fine-grained microservices systems provides the perfect technology mix for modern systems.
Design robust graph neural networks with PyTorch Geometric by combining graph theory and neural networks with the latest developments and appsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesImplement -of-the-art graph neural architectures in PythonCreate your own graph datasets from tabular dataBuild powerful traffic forecasting, recommender systems, and anomaly detection applicationsBook DescriptionGraph neural networks are a highly effective tool for analyzing data that can be represented as a graph, such as networks, chemical compounds, or transportation networks.
Analyzing the Social Web provides a framework for the analysis of public data currently available and being generated by social networks and social media, like Facebook, Twitter, and Foursquare.
Heterogeneous Computing with OpenCL, Second Edition teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs) such as AMD Fusion technology.
Learn 2D drawing and 3D modeling from scratch using AutoCAD and AutoCAD LT 2023 and become a CAD professionalKey FeaturesLearn techniques for making, modifying, and managing AutoCAD 2D and 3D drawingsUnderstand how to use reusable and named objects like blocks, xRef, and layersScale, annotate, and print drawings from model space and layoutBook DescriptionAutoCAD is one of the most versatile software applications for architectural and engineering designs and the most popular computer-aided design (CAD) platform for 2D drafting and 3D modeling.
Use the Elastic Stack for search, security, and observability-related use cases while working with large amounts of data on-premise and on the cloudKey FeaturesLearn the core components of the Elastic Stack and how they work togetherBuild search experiences, monitor and observe your environments, and defend your organization from cyber attacksGet to grips with common architecture patterns and best practices for successfully deploying the Elastic StackBook DescriptionThe Elastic Stack helps you work with massive volumes of data to power use cases in the search, observability, and security solution areas.
Feature Extraction and Image Processing for Computer Vision is an essential guide to the implementation of image processing and computer vision techniques, with tutorial introductions and sample code in Matlab.
Digital Design and Computer Architecture, Second Edition, takes a unique and modern approach to digital design, introducing the reader to the fundamentals of digital logic and then showing step by step how to build a MIPS microprocessor in both Verilog and VHDL.
This book provides a careful explanation of the basic areas of electronics and computer architecture, along with lots of examples, to demonstrate the interface, sensor design, programming and microcontroller peripheral setup necessary for embedded systems development.
ADVANCES IN FUZZY-BASED INTERNET OF MEDICAL THINGS (IOMT) This book explores the latest trends, transitions, and advancements of the Internet of Medical Things whose integration through cloud-hosted software applications adds required intelligence from tools such as medical instruments, scanners, and appliances, enabling fuzzy logic to help medical professionals establish linguistic concepts in deciding diagnosis and prognosis.
METAHEURISTICS for MACHINE LEARNING The book unlocks the power of nature-inspired optimization in machine learning and presents a comprehensive guide to cutting-edge algorithms, interdisciplinary insights, and real-world applications.
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations.
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations.
AUTOMATIC SPEECH RECOGNITION and TRANSLATION for LOW-RESOURCE LANGUAGES This book is a comprehensive exploration into the cutting-edge research, methodologies, and advancements in addressing the unique challenges associated with ASR and translation for low-resource languages.
APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loopholes using artificial intelligence (AI) and machine learning (ML) Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection is a comprehensive look at state-of-the-art theory and practical guidelines pertaining to the subject, showcasing recent innovations, emerging trends, and concerns as well as applied challenges encountered, and solutions adopted in the fields of cybersecurity using analytics and machine learning.
APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loopholes using artificial intelligence (AI) and machine learning (ML) Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection is a comprehensive look at state-of-the-art theory and practical guidelines pertaining to the subject, showcasing recent innovations, emerging trends, and concerns as well as applied challenges encountered, and solutions adopted in the fields of cybersecurity using analytics and machine learning.
Writing for Interaction focuses on the art of creating the information experience as it appears within software and web applications, specifically in the form of user interface text.
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available.
Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems provides a thorough understanding of the platform architecture of modern embedded computing systems that drive mobile devices.
As a usability specialist or interaction designer working with the government, or as a government or contractor professional involved in specifying, procuring, or managing system development, you need this book.
Computers as Components: Principles of Embedded Computing System Design, Third Edition, presents essential knowledge on embedded systems technology and techniques.
Heterogeneous Computing with OpenCL teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs) such as AMD Fusion technology.
Data Insights: New Ways to Visualize and Make Sense of Data offers thought-provoking insights into how visualization can foster a clearer and more comprehensive understanding of data.
Business Intelligence: The Savvy Managers Guide, Second Edition, discusses the objectives and practices for designing and deploying a business intelligence (BI) program.
User Experience Management: Essential Skills for Leading Effective UX Teams deals with specific issues associated with managing diverse user experience (UX) skills, often in corporations with a largely engineering culture.
This book focuses on how the BOXES Methodology, which is based on the work of Donald Michie, is applied to ill-defined real-time control systems with minimal a priori knowledge of the system.
The UX Book: Process and Guidelines for Ensuring a Quality User Experience aims to help readers learn how to create and refine interaction designs that ensure a quality user experience (UX).
The exponential explosion of images and videos concerns everybody's common life, since this media is now present everywhere and in all human activities.
It's Our Research: Getting Stakeholder Buy-in for User Experience Research Projects discusses frameworks, strategies, and techniques for working with stakeholders of user experience (UX) research in a way that ensures their buy-in.
GPU Computing Gems Emerald Edition offers practical techniques in parallel computing using graphics processing units (GPUs) to enhance scientific research.
Observing the User Experience: A Practitioner's Guide to User Research aims to bridge the gap between what digital companies think they know about their users and the actual user experience.
Computer Architecture: A Quantitative Approach, Fifth Edition, explores the ways that software and technology in the cloud are accessed by digital media, such as cell phones, computers, tablets, and other mobile devices.