Computers & Technology
epub |eng | | Author:Bir Bhanu & Prue Talbot
9.1 Introduction Evaluation of dynamic cell processes and behavior is important in basic research [11, 40, 43, 46], in the application of stem cell biology to regenerative medicine [29, 41], ...
( Category:
Computer Science
February 18,2017 )
epub |eng | | Author:Luca Gaetano Amaru
3.4.2 Depth-Oriented MIG Algebraic Optimization To optimize the depth of a MIG , we aim at reducing the length of its critical path. A valid strategy for this purpose is ...
( Category:
Hardware & DIY
February 16,2017 )
epub |eng | | Author:Peter Hintenaus
Fig. 6.5Step responses of a second, a third, and a fourth order Butterworth filter, all having corner frequency Fig. 6.6Bode plots of a second, a third, and a fourth order ...
( Category:
Hardware & DIY
February 12,2017 )
mobi, azw3, epub |eng | 2016-08-07 | Author:John V. Guttag
A rooted binary tree is an acyclic directed graph in which There is exactly one node with no parents. This is called the root. Each non-root node has exactly one ...
( Category:
Python
February 10,2017 )
epub |eng | | Author:Magnus Vilhelm Persson
As for the final analysis, two different clusters are identified. Just as our previous hypothesis, there is a cluster with a clear linear trend with relatively higher GDP, which is ...
( Category:
Data Processing
January 21,2017 )
epub, mobi |eng | 2014-03-24 | Author:Jordan Tigani & Siddartha Naidu
( Category:
Data Warehousing
January 14,2017 )
epub |eng | | Author:Jens Eickhoff
As the Power-Board in this design meets the steady state requirements given by the manufacturers of all three OBC data handling board types, an Engineering Model was built. Diverse tests ...
( Category:
Hardware & DIY
January 13,2017 )
epub |eng | | Author:Jens Eickhoff
9.2.3.2 PMC Internal Mission Product Data Handling A matrix structure of all data sinks, data sources and data buffers is used to transfer payload data from one entity of the ...
( Category:
Computer Science
January 13,2017 )
epub |eng | | Author:Kevin Languedoc
Once we have the image stored in the imageView, it is passed to the imageData using UIImagePNGRepresentation, which takes imageView.image as a parameter. The image data is passed and stored ...
( Category:
Compilers
January 9,2017 )
epub, pdf, azw3 |eng | | Author:Dipanjan Sarkar
def tfidf_transformer(bow_matrix): transformer = TfidfTransformer(norm='l2', smooth_idf=True, use_idf=True) tfidf_matrix = transformer.fit_transform(bow_matrix) return transformer, tfidf_matrix You can see that we have used the L2 norm option in the parameters and also made ...
( Category:
Python
January 9,2017 )
epub |eng | | Author:Seema Acharya & Subhashini Chellappan
5.6.2.3.5 Step 5 Drag the measure “Measure Values” from the measures area under the data pane to the rows shelf (Shown in Fig. 5-92). Figure 5-92.Measure “Measure Values ” placed ...
( Category:
Object-Oriented Design
January 8,2017 )
epub |eng | | Author:Shakil Akhtar & Ravi Magham
phoenix.query.maxGlobalMemoryPercentage: This property shows the percentage of total available heap memory. The sum of all working caches must be less than this global memory pool size; if not, you might ...
( Category:
Programming
January 8,2017 )
epub |eng | | Author:Kunal Relan
Installing Charles Proxy is a pretty easy job and it is available for all platforms, as it is built on Java. Charles Proxy is available at http://charlesproxy.com/download . Once you ...
( Category:
Software Development
January 8,2017 )
epub |eng | | Author:Andrew Bettany & Mike Halsey
Access-Based Enumeration (ABE) Ever since Windows NT, one of the criticisms of Windows is that users are able to “see” shared files and folders on the file server. If users ...
( Category:
Databases & Big Data
January 8,2017 )
epub |eng | | Author:Bill Gertz
6 ISLAMIC TERROR When Jihad Johnny Comes Marching Home The struggle with revolutionary Islam will only be won when the West begins to methodically analyze the ideological religion that empowers ...
( Category:
National
January 8,2017 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16906)Deep Learning with Python by François Chollet(15527)
The Mikado Method by Ola Ellnestam Daniel Brolund(12791)
Hello! Python by Anthony Briggs(12642)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11924)
Dependency Injection in .NET by Mark Seemann(11730)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10536)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10534)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(10266)
Grails in Action by Glen Smith Peter Ledbrook(9846)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9585)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9272)
Hit Refresh by Satya Nadella(9040)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8556)
The Kubernetes Operator Framework Book by Michael Dame(8480)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8301)
Kotlin in Action by Dmitry Jemerov(8294)
Robo-Advisor with Python by Aki Ranin(8256)
Practical Computer Architecture with Python and ARM by Alan Clements(8228)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8199)