Search Results for propagation. - Narrowed by: Deep learning (Machine learning)
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dpropagation.$0026qf$003dSUBJECT$002509Subject$002509Deep$002blearning$002b$002528Machine$002blearning$002529$002509Deep$002blearning$002b$002528Machine$002blearning$002529$0026ps$003d300?
2026-02-20T16:31:48Z
Deep learning on embedded systems : a hands-on approach using Jetson Nano and Raspberry Pi
ent://SD_ILS/0/SD_ILS:599880
2026-02-20T16:31:48Z
2026-02-20T16:31:48Z
Author Arif, Tariq M., author. John Wiley & Sons, publisher.<br/>Preferred Shelf Number Q325.73 .A75 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394269297">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394269297</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Deep learning and its applications using Python
ent://SD_ILS/0/SD_ILS:598648
2026-02-20T16:31:48Z
2026-02-20T16:31:48Z
Author Basha, Niha K. editor Bhatia, Surbhi, editor Kumar, Abhishek, editor Mashat, Arwa, editor.<br/>Preferred Shelf Number Q325.73 .D44 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167791">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167791</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Deep learning approaches for security threats in IoT environments
ent://SD_ILS/0/SD_ILS:597870
2026-02-20T16:31:48Z
2026-02-20T16:31:48Z
Author Abdel-Basset, Mohamed, 1985- author. Moustafa, Nour, author. Hawash, Hossam, author.<br/>Preferred Shelf Number TK5105.8857 .A23 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119884170">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119884170</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>