Computers & Technology
epub |eng | | Author:Unknown
101. Torres, E. O., & Rincón-Mora, G. A. (2010). A 0.7-$\mu $ m BiCMOS electrostatic energy-harvesting system IC. IEEE Journal of Solid-State Circuits, 45, 483–496. 102. Torres, E. O., & ...
( Category:
Networking & Cloud Computing
July 3,2020 )
epub |eng | | Author:Unknown
16.3.1 Forecasting the Flow of Reusable Products In order to make proper tactical and operational decisions, such as (re-)distribution capacities, recovery and manufacturing capacities, order quantities and timing, and pricing ...
( Category:
Architecture
July 3,2020 )
epub |eng | | Author:Wilk Oliveira & Ig Ibert Bittencourt
The system structure is composed of three different parts: front-end, back-end, and satellite. The front-end is responsible for the user’s graphical interface (input and output), the back-end is responsible for ...
( Category:
Games & Strategy Guides
July 3,2020 )
epub |eng | | Author:Li-Hsien Sun & Xin-Wei Huang & Mohammed S. Alqawba & Jong-Min Kim & Takeshi Emura
The variance for is given by Hence, the variance is decomposed into two parts: one is the squared difference between and , and the other is the weighted sum of ...
( Category:
Education & Reference
July 3,2020 )
epub |eng | | Author:Jianming Zhang & Filip Malmberg & Stan Sclaroff
CNN_FT: The CNN model fine-tuned on the real image data only. CNN_Syn: The CNN model fine-tuned on the synthetic images only. This baseline reflects how close the synthetic images are ...
( Category:
Computer Science
July 3,2020 )
epub |eng | 2019-07-15 | Author:Mike Meyers
Setting Up Security In the router’s configuration utility, open the Security section and choose a security mode. You might also be prompted to choose an authentication type or encryption technique. ...
( Category:
LAN
July 3,2020 )
epub |eng | | Author:Unknown
4. Open Science Collaboration: Estimating the reproducibility of psychological science. Science. 349(6251), (2015). https://doi.org/10.1126/science.aac4716 5. Jager, W.: Enhancing the realism of simulation (EROS): on implementing and developing psychological theory in ...
( Category:
Business Technology
July 3,2020 )
epub |eng | | Author:Liang Xiao & Weihua Zhuang & Sheng Zhou & Cailian Chen
(3.17) (2) With x + = x − , the learning regret can be bounded as (3.18) where is the expectation of x t on the condition that x t ...
( Category:
Computer Science
July 3,2020 )
epub, mobi, pdf |eng | 2018-08-26 | Author:David Clinton [David Clinton]
( Category:
Linux & UNIX Administration
July 2,2020 )
epub |eng | | Author:Unknown
5.3.3 Game 1: Piano The first game scene created was the piano scene (Fig. 5.5). As mentioned previously, for VR to be successful, there needs to be user activity which ...
( Category:
Computer Science
July 2,2020 )
epub, pdf |eng | 2020-06-29 | Author:Sapp, Arthur S [Sapp, Arthur S]
Hacker Ethics and Code of Conduct Like any other profession, hacking has its Code of Conduct that establishes rules that can help customers (individuals or organizations) evaluate whether the person ...
( Category:
Internet & Social Media
July 2,2020 )
epub |eng | 2017-05-19 | Author:Craig A. Barnes [Barnes, Craig A.]
( Category:
Industries
July 2,2020 )
epub |eng | | Author:Andreas Öchsner & Resam Makvandi
Let us introduce in the following an additional example (adapted from [5]). Figure 4.4 shows a planar spring weight system which is composed of 6 springs (Roman numbering I to ...
( Category:
Networking & Cloud Computing
July 2,2020 )
epub, pdf |eng | 2019-07-15 | Author:Mike Meyers
Figure 19-14 Link-local address in ipconfig The second 64 bits of a link-local address, the interface ID, are generated in two ways. Every current operating system generates a 64-bit random ...
( Category:
PCs
July 2,2020 )
epub |eng | 2019-03-29 | Author:James D. Miller [James D. Miller]
Without digging too deep into the theories behind parameter selection, we'll say here that this step involves determining the possible parameter value combinations, looking at their overall fitting results, running ...
( Category:
Computer Vision & Pattern Recognition
July 2,2020 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(27899)The Mikado Method by Ola Ellnestam Daniel Brolund(25199)
Hello! Python by Anthony Briggs(24241)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23328)
Kotlin in Action by Dmitry Jemerov(22415)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21880)
Dependency Injection in .NET by Mark Seemann(21765)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20631)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19457)
Grails in Action by Glen Smith Peter Ledbrook(18532)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17018)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15801)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13653)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11794)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11129)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10617)
Hit Refresh by Satya Nadella(9172)
The Kubernetes Operator Framework Book by Michael Dame(8559)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8393)
Robo-Advisor with Python by Aki Ranin(8339)