Book picks similar to
Learning Theory: An Approximation Theory Viewpoint by Felipe Cucker
machine-learning
mathematics
41-approximation-theory
62-statistics
Sikhs: The Untold Agony Of 1984
Nilanjan Mukhopadhyay - 2015
She claimed the police had inserted a stick inside her… Swaranpreet realised that she had been cruelly violated; He spoke a single sentence but repeated it twice in chaste Punjabi: ‘Please give me a turban? I want nothing else…’ These are voices begging for deliverance in the aftermath of Indira Gandhi’s assassination in October-November 1984 in which 2,733 Sikhs were killed, burnt and exterminated by lumpens in the country. Nilanjan Mukhopadhyay walks us through one of the most shameful episodes of sectarian violence in post Independent India and highlights the apathy of subsequent governments towards Sikhs who paid a price for what was clearly a state-sponsored riot. Poignant, raw and most importantly, macabre, the personal histories in the book reveal how even after three decades, a community continues to battle for its identity in its own country.
The Judas Conspiracy
Robert B. Williams - 2018
Williams **
An armed assault force raids the marble halls of the British Museum. The target – the most heinous relic of all time – the last surviving coin of the blood money paid to Judas Iscariot for his betrayal of Christ.For over a thousand years the cursed pieces of silver cut a swath of famine, pestilence and ruinous destruction wherever they were carried. To save humanity from the malevolent power of the coins, the Knights Templar were given a Papal Blessing and sent on a pilgrimage to the holy lands to find and hide the thirty pieces of silver.A sinister organization has unlocked a chilling secret—the ability to control the power of the coin and use it as a terrifying weapon, posing the greatest threat to mankind in history.Sanford Carter, antiquities thief and ladies’ man, has been ensnared by the secret service and forced to execute a daring burglary on their behalf. His mission is simple – steal the coin first.Sarah Hudson, the studious and law-abiding archaeologist who doesn’t believe in curses, only science, is in the wrong place at the wrong time and refuses to hand over the coin or allow Carter to get away with his bold crime.With ruthless dark forces closing in, the brazen thief and the scholarly archaeologist must unlock the hidden history of the coin if they are to safeguard humanity from its evil curse.From the cobbled streets of London to the spectacular volcanic landscapes of Iceland, The Judas Conspiracy sets a cracking pace from the start and never lets up.
For fans of James Rollins, Matthew Reilly, Michael C. Grumley, A.G. Riddle, Rob Jones, Matt Rogers, James D. Prescott, Brad Thor, Douglas E. Richards, Clive Cussler and David Baldacci
Computational Thinking
Peter J. Denning - 2019
More recently, "computational thinking" has become part of the K-12 curriculum. But what is computational thinking? This volume in the MIT Press Essential Knowledge series offers an accessible overview, tracing a genealogy that begins centuries before digital computers and portraying computational thinking as pioneers of computing have described it.The authors explain that computational thinking (CT) is not a set of concepts for programming; it is a way of thinking that is honed through practice: the mental skills for designing computations to do jobs for us, and for explaining and interpreting the world as a complex of information processes. Mathematically trained experts (known as "computers") who performed complex calculations as teams engaged in CT long before electronic computers. The authors identify six dimensions of today's highly developed CT--methods, machines, computing education, software engineering, computational science, and design--and cover each in a chapter. Along the way, they debunk inflated claims for CT and computation while making clear the power of CT in all its complexity and multiplicity.
Digital Signal Processing: Principles, Algorithms, and Applications
John G. Proakis - 1992
This book presents the fundamentals of discrete-time signals, systems, and modern digital processing and applications for students in electrical engineering, computer engineering, and computer science.The book is suitable for either a one-semester or a two-semester undergraduate level course in discrete systems and digital signal processing. It is also intended for use in a one-semester first-year graduate-level course in digital signal processing.
Forecasting: Principles and Practice
Rob J. Hyndman - 2013
Deciding whether to build another power generation plant in the next five years requires forecasts of future demand. Scheduling staff in a call centre next week requires forecasts of call volumes. Stocking an inventory requires forecasts of stock requirements. Telecommunication routing requires traffic forecasts a few minutes ahead. Whatever the circumstances or time horizons involved, forecasting is an important aid in effective and efficient planning. This textbook provides a comprehensive introduction to forecasting methods and presents enough information about each method for readers to use them sensibly. Examples use R with many data sets taken from the authors' own consulting experience.
Bitcoin Widow: Love, Betrayal and the Missing Millions
Jennifer Robertson - 2022
Then, in one fateful night, she lost everything, and the nightmare beganJennifer Robertson was working hard to build a life for herself from the ashes of her first marriage. Still only twenty-six, she swiped right on a dating app and met Gerry Cotten, a man she would not normally have considered—too young and not her type—but found she’d met her match. Eccentric but funny and kind, Cotten turned out to be a bitcoin wizard who quickly amassed substantial wealth through his company, Quadriga. The couple travelled the world, first-class all the way, while Cotten worked on his multitude of encrypted laptops. Then, while the couple was on their honeymoon in India, opening an orphanage in their name, Gerry fell ill and died in a matter of hours. Jennifer was consumed by grief and guilt, but that was only the beginning. It turned out that Gerry owed $250 million to Quadriga customers, and all the passwords to his encrypted virtual vaults, hidden on his many laptops, had died with him. Jennifer was left with more than one hundred thousand investors looking for their money, and questions, suspicions and accusations spiralling dangerously out of control. The Quadriga scandal touched off major investment and criminal investigations, not to mention Internet rumours circulating on dark message boards, including claims that Gerry had faked his own death and that his wife was the real mastermind behind a sophisticated sting operation. While Jennifer waited for a dead man’s switch e-mail that would probably never come, it became clear that Cotten had gambled away about $100 million of the funds entrusted to him for investment in his many schemes, leaving Robertson holding the bag. Bitcoin Widow is Catch Me If You Can meeting a widow betrayed, a life of fairy-tale romance and private jets torched by duplicity, as Jennifer Robertson tries to reset her life in the wake of one of the biggest investments scandals of the digital age.
Introduction to Modern Cryptography: Principles and Protocols
Jonathan Katz - 2007
Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half of the book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications.Serving as a textbook, a reference, or for self-study, Introduction to Modern Cryptography presents the necessary tools to fully understand this fascinating subject.
Facts and Mysteries in Elementary Particle Physics
Martinus Veltman - 2003
We are introduced to the known particles of the world we live in. An elegant explanation of quantum mechanics and relativity paves the way for an understanding of the laws that govern particle physics. These laws are put into action in the world of accelerators, colliders and detectors found at institutions such as CERN and Fermilab that are in the forefront of technical innovation. Real world and theory meet using Feynman diagrams to solve the problems of infinities and deduce the need for the Higgs boson.Facts and Mysteries in Elementary Particle Physics offers an incredible insight from an eyewitness and participant in some of the greatest discoveries in 20th century science. From Einstein's theory of relativity to the elusive Higgs particle, this book will fascinate and educate anyone interested in the world of quarks, leptons and gauge theories.This book also contains many thumbnail sketches of particle physics personalities, including contemporaries as seen through the eyes of the author. Illustrated with pictures, these candid sketches present rare, perceptive views of the characters that populate the field.The Chapter on Particle Theory, in a pre-publication, was termed “superbly lucid” by David Miller in Nature (Vol. 396, 17 Dec. 1998, p. 642).
Genetic Algorithms in Search, Optimization, and Machine Learning
David Edward Goldberg - 1989
Major concepts are illustrated with running examples, and major algorithms are illustrated by Pascal computer programs. No prior knowledge of GAs or genetics is assumed, and only a minimum of computer programming and mathematics background is required. 0201157675B07092001
An Introduction to Probability Theory and Its Applications, Volume 1
William Feller - 1968
Beginning with the background and very nature of probability theory, the book then proceeds through sample spaces, combinatorial analysis, fluctuations in coin tossing and random walks, the combination of events, types of distributions, Markov chains, stochastic processes, and more. The book's comprehensive approach provides a complete view of theory along with enlightening examples along the way.
The Awakening Of An Indigo
Vikram - 2017
As he begins to discover the psychic abilities within him, he comes in contact with Dr. Myra, who helps him through a journey of self-discovery. Past life regression therapy helps him understand the glorious lives he has led in his previous births. Will this help Vikram understand the purpose of his current life? Can divine guidance help him cope with the effects of his past and help him realize his full potential? Will he get past the challenges on the way and fulfill his life purpose? Read The Awakening of an Indigo to find out.
Killer Child: Mary Bell: A Tragic True Story
Sylvia Perrini - 2015
Mary was found guilty of manslaughter due to diminished responsibility and was sentenced to 'detention' for life. What would induce a young child to murder two other young children? In this short book, Sylvia Perrini, looks at Mary’s tragic life, her years in prison and life since prison. This short book follows in the tradition of great true crime writers such as Ann Rule, M. William Phelps and R J Parker.
Multivariate Data Analysis
Joseph F. Hair Jr. - 1979
This book provides an applications-oriented introduction to multivariate data analysis for the non-statistician, by focusing on the fundamental concepts that affect the use of specific techniques.
Ahead in the Cloud: Best Practices for Navigating the Future of Enterprise IT
Stephen Orban - 2018
It has made countless new businesses possible and presents a massive opportunity for large enterprises to innovate like startups and retire decades of technical debt. But making the most of the cloud requires much more from enterprises than just a technology change. Stephen Orban led Dow Jones’s journey toward digital agility as their CIO and now leads AWS’s Enterprise Strategy function, where he helps leaders from the largest companies in the world transform their businesses. As he demonstrates in this book, enterprises must re-train their people, evolve their processes, and transform their cultures as they move to the cloud. By bringing together his experiences and those of a number of business leaders, Orban shines a light on what works, what doesn’t, and how enterprises can transform themselves using the cloud.
Macroanalysis: Digital Methods and Literary History
Matthew L. Jockers - 2013
Jockers introduces readers to large-scale literary computing and the revolutionary potential of macroanalysis--a new approach to the study of the literary record designed for probing the digital-textual world as it exists today, in digital form and in large quantities. Using computational analysis to retrieve key words, phrases, and linguistic patterns across thousands of texts in digital libraries, researchers can draw conclusions based on quantifiable evidence regarding how literary trends are employed over time, across periods, within regions, or within demographic groups, as well as how cultural, historical, and societal linkages may bind individual authors, texts, and genres into an aggregate literary culture. Moving beyond the limitations of literary interpretation based on the "close-reading" of individual works, Jockers describes how this new method of studying large collections of digital material can help us to better understand and contextualize the individual works within those collections.