Computers & Technology
epub |eng | 2019-12-16 | Author:Vaskaran Sarcar [Vaskaran Sarcar]
( Category:
Object-Oriented Design
January 3,2020 )
epub |eng | 2019-12-26 | Author:Yuri Diogenes, Erdal Ozkaya
( Category:
Network Security
January 3,2020 )
epub, pdf |eng | 2016-10-24 | Author:Rainer Grimm
The algorithms expect the value val or a generator gen as an argument. gen has to be a function taking no argument and returning the new value. The return value ...
( Category:
Programming
January 2,2020 )
epub |eng | | Author:Saad Bin Ahmed & Muhammad Imran Razzak & Rubiyah Yusof
(4.10) (4.11) 2.Text edge detection The region of interest such as scene text is detected by applying Laplacian kernel. 3.Image sharpening The image is enhanced by highlighting the edges to ...
( Category:
Databases & Big Data
January 2,2020 )
epub |eng | | Author:David Paper
def get_scores(model, Xtest, ytest): y_pred = model.predict(Xtest) return np.sqrt(mean_squared_error(ytest, y_pred)),\ model.__class__.__name__ if __name__ == "__main__": br = '\n' X = np.load('data/X_boston.npy') y = np.load('data/y_boston.npy') print ('feature shape', X.shape) print ('target ...
( Category:
Intelligence & Semantics
January 2,2020 )
epub |eng | | Author:Raymond S. T. Lee
7.2.13 Neural Network—Where to Go? In this section, we have studied an overview of neural networks, their basic structure, and mechanisms. Current trends of neural networks research and development are ...
( Category:
Intelligence & Semantics
January 2,2020 )
epub |eng | | Author:Luc Bors & Ardhendu Samajdwer & Mascha van Oosterhout
2.When you invoke a digital assistant over a channel, skills associated to the digital assistant will always use digital assistant’s channel to send and receive messages. Irrespective of whether skills ...
( Category:
Computer Science
January 2,2020 )
epub |eng | | Author:Yutaka Kidawara & Eiichiro Sumita & Hisashi Kawai
11. Graves, A., Fernandez, S., Gomez, F., Shmidhuber, J.: Connectionist temporal classification: labelling unsegmented sequence data with recurrent neural networks. In: Proceedings of the International Conference on Machine Learning (ICML) ...
( Category:
Computer Science
January 2,2020 )
mobi |eng | 2019-12-26 | Author:Erdal Ozkaya Yuri Diogenes [Yuri Diogenes, Erdal Ozkaya]
( Category:
Network Security
January 2,2020 )
epub |eng | | Author:Brij B. Gupta & Gregorio Martinez Perez & Dharma P. Agrawal & Deepak Gupta
( Category:
Computer Science
January 2,2020 )
epub, pdf |eng | | Author:Wolfgang W. Osterhage
Bibliography 1. I. Papadhopulli, N. Frasheri, Today’s challenges of symbolic execution and search based algorithms for automated structural testing. Open J. Commun. Softw. (2015) 2. W. Osterhage, Automatisierte Verfahren für ...
( Category:
Software Development
January 2,2020 )
epub |eng | 2019-06-18 | Author:Pete Warden
Building the Dataset To train our person detection model, we need a large collection of images that are labeled depending on whether they have people in them. The ImageNet 1,000-class ...
( Category:
Computer Science
January 2,2020 )
epub |eng | | Author:Abhishek Chopra & Mukund Chaudhary
Where labeling is not required Evidence that can be prepared: Information classification policy and information classification guideline. Who prepares it: The information security team is responsible for preparing the information ...
( Category:
Storage & Retrieval
January 2,2020 )
epub |eng | | Author:David Both
Exercises Complete the following exercises to finish this chapter:1.List at least three advantages to creating and using scripts. 2.What happens when you change the string comparison operator (==) to the ...
( Category:
Software Development
January 2,2020 )
epub |eng | | Author:Muhammad Yasin & Jeyavijayan (JV) Rajendran & Ozgur Sinanoglu
When the foundry is trusted and protection is required only against malicious end-users, the tree inputs may be camouflaged by inserting INV/BUF camouflaged gates at each of the tree input. ...
( Category:
Computer Science
January 2,2020 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(27999)The Mikado Method by Ola Ellnestam Daniel Brolund(25282)
Hello! Python by Anthony Briggs(24335)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23421)
Kotlin in Action by Dmitry Jemerov(22504)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21961)
Dependency Injection in .NET by Mark Seemann(21838)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20707)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19517)
Grails in Action by Glen Smith Peter Ledbrook(18595)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17031)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15836)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13684)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11851)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9188)
The Kubernetes Operator Framework Book by Michael Dame(8563)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8358)