-
電子書 電腦資訊
【電子書】Python機器學習超進化:AI影像辨識跨界應用實戰
碁峰資訊 出版轟動程式圈3大AI影像辨識利器 從收集資料、圖片擷取、建立標籤、訓練模型 到智慧影像辨識的全面進化實戰! 人工智慧(Artificial Intelligence)應用基本上可分五大層
-
一本書精通Python:爬蟲遊戲AI完全制霸
深智數位 出版以夠用、實用為原則,選擇Python 中必備、實用的知識說明,強化對程式思維能力的培養。案例選取接近生活,有助加強讀者的學習興趣。書中每個案例均提供了詳細的設計想法、關鍵技術分析以及實際的解決方
-
學Python程式設計-使用Halocode光環板輕鬆創作AI和IoT應用(精裝版)內含-光環板、USB數據
台科大 出版大:範圍大,涵蓋創意實現、專案教學、程式普及和群控技術,由淺入深,就算沒有基礎也能快速上手 人:結合微軟Azure雲,實現雲人工智慧應用 物:存取ThingSpeak,快速實現物聯應用
-
Raspberry Pi x Python x Prolog:虛實整合的AI人工智慧專案開發實戰
碁峰資訊 出版利用Raspberry Pi開發人工智慧的應用 本書會討論到許多主要的AI主題,包含專家系統、淺層與深度機器學習、模糊邏輯控制等等。我們會在Raspberry Pi上透過Python程式語言來示範A
-
數據乃AI之基石(熱銷版):用Python爬蟲抓取大量資料
上奇科技 出版本書內容來自筆者在浙江某高校授課內容,主要介紹運用Python工具獲取電商平臺的頁面數據,並對數據做分析及儲存;本書簡化了Python基礎部分,保證有足夠的篇幅來介紹爬蟲和數據清洗的內容,至於對Py
-
科班出身的AI人必修課:OpenCV影像處理 使用 python
深智數位 出版電腦視覺技術的應用越來越廣泛,有非常多的軟體工具和函數庫可以用來建置電腦視覺應用,針對Python的OpenCV就是一個很好的選擇,本書正是針對以Python為基礎的OpenCV來說明的。
-
AI行銷學:為顧客量身訂做的全通路轉型策略
★★★★☆天下文化 出版超越數位轉型,利用人工智慧與大數據,打造無縫接軌的顧客體驗 在大數據與人工智慧興起的時代, 只是數位轉型已經不夠, 每個企業都該採用以顧客為中心的全通路轉型! 拉斯穆斯.賀林與科
-
AI也能說文解字:Python上的文字算法
佳魁數位 出版深入淺出地介紹自然語言處理和機器學習技術 透過本書,讀者將學習和理解: ★ 概率論、資訊理論、貝葉斯法則等基礎知識 ★ 最佳化問題、最大似然估計、梯
-
數據乃AI之基石:用Python爬蟲抓取大量資料
深石數位 出版《本書特色》 通過實戰教導初學者爬蟲抓取數據資料並進一步分析的技術,適合Python初學者、愛好者及高等院校之相關科系之學生使用。 《本書內容》 本書內容來自筆者在
-
AI及機器學習的經脈:演算法新解
佳魁數位 出版《AI及機器學習的經脈:演算法新解》同時用函數式方法和傳統方法介紹主要的基本演算法和資料結構,資料結構部分包括二叉樹、紅黑樹、AVL樹、Trie、Patricia、尾碼樹、B樹、二叉堆、二項式堆
-
-
-
-
-
-
-
-
Medicare and Social Security Retirement Guide
Publishdrive 出版Don't Let Medicare and Social Security Mistakes Cost You Thousands in Retirement Every year, millio
-
Certificate of Cloud Security Knowledge (Ccsk V5) Study Guide
As cloud technology becomes increasingly essential across industries, the need for thorough securit
-
Understanding the Human Factor in Cyber Security
In an age where firewalls and encryption are just the beginning, Understanding the Human Factor in
-
-
Cloud Computing Security
CRC Press 出版The book provides a fundamental exploration of cloud security, addressing the growing risks associa
-
The Ethics of National Security Intelligence Institutions
Routledge 出版This book explores the ethics of national security intelligence institutions operating in contempor
-
Availability, Reliability and Security
Springer 出版This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Wo
-
Water Security and the Sustainable Development Goals
Water security is at the heart of achieving the Sustainable Development Goals, influencing poverty
-
Someone Saved My Life Tonight - A Justice Security Short Story
They're called the "grunts" - the uniformed officers of Justice Security. They don't have the cushy
-
American Border Security and Its Challenge to American National Security
The attacks of September 11th, 2001 brought terrorism to the United States and the realization that
-
Using Strategic Communications to Address Critical Threats to Border Security
Abstract Border security improvements have certainly been made since the tragic events of 9/11, but
-
The United Nations Security Council and the Authorisation of Force
This book examines the United Nations Security Council's authorisation of the use of force, conside
-
Loss of the Global Positioning System and Its Impact on U.S. Economic Security
The use of the Global Positioning System (GPS) has become so ubiquitous within the United States ec
-
Applying Automated Theorem Proving to Computer Security
While more and more data is stored and accessed electronically, better access control methods need
-
Analyzing Air Force Security Posture on Typical Industrial Control Systems Servicing Critical Infrastructures
Today's Air Force bases employ automated systems controlling critical functions such as power deliv
-
Routledge Handbook of Sport Security
Routledge 出版This book provides in-depth analysis of security issues and concerns in contemporary sport. Featuri
-
State, Security, and Cyberwar
Routledge 出版This book examines the states and security apparatuses in the contemporary global order, and the pr
-
Achieving Energy Security in the Caribbean Basin
Concerns over the soaring costs, limited supply and harmful ecological effects of fossil fuels have
-
Automating Security Protocol Analysis
When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took
-
Engaging African Sub-Regional Organizations to Improve Continental Stability and Security
Abstract The United States has been engaged on the African continent for one reason or another for
-
Automating Security Protocol Analysis
When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took
-
Transportation Security Administration in Defense of the National Aviation Infrastructure
The Transportation Security Administration rapidly fielded over 28,000 Transportation Security Offi
-
Transportation Security Administration in Defense of the National Aviation Infrastructure
The Transportation Security Administration rapidly fielded over 28,000 Transportation Security Offi
-
Buildling Maritime Security in Southeast Asia
The Naval War College Review was established in 1948 and is a forum for discussion of public policy
-
North East Asian Regional Power Security Issues of Korean Unification
Divided in 1945 between the United States and the Soviet Union, Korea's status was as much a testam
-
Globalized Security Reshaping America's Defense Trade Policy
Globalism is altering military, economic, and political forces, and their confluence has become out
-
Achieving Energy Security in the Caribbean Basin
Concerns over the soaring costs, limited supply and harmful ecological effects of fossil fuels have
-
National Security Implications of Long-Term Deficit Spending
This AY2010 USAWC student research paper explores the impact of ongoing deficit spending in terms o
-
The Army National Gaurd and the Department of Homeland Security
This AY-10 USAWC resident student paper argues that the citizen-soldiers of the Army National Guard
-
Promoting Japan and South Korea's Role in East Asian Security
The State Partnership Program, a National Guard supported initiative, is one of the many Theater Se
-
National Security Implications of Long-Term Deficit Spending
This AY2010 USAWC student research paper explores the impact of ongoing deficit spending in terms o