Computer Science
epub, pdf |eng | 2017-08-16 | Author:Yannick Lefebvre [Yannick Lefebvre]

See also The Creating a custom post type recipe Adding custom fields to categories In addition to specifying names for categories, it may be useful to attach additional information to ...
( Category: PHP Programming June 28,2020 )
epub |eng | | Author:Unknown

(1) Fig. 4Convolution of a matrix Activation Function: Rectified Linear Unit ReLU is used in the model to increase non-linearity in the ConvNet and it acts on a fundamental step. ...
( Category: Economics June 28,2020 )
epub |eng | 0101-01-01 | Author:Paul J. Springer [Springer, Paul J.]

Sources Blaker, James R. 2007. Transforming Military Force: The Legacy of Arthur Cebrowski and Network Centric Warfare. Westport, CT: Praeger Security International. Singer, Peter W. 2009. Wired for War. New ...
( Category: Robotics & Automation June 28,2020 )
epub |eng | | Author:Carsten Schneider & Eugene Zima

For every fixed , denote by V(p) the set of all sequences with , i.e., the solution space of the recurrence equation encoded by p. This is a vector space ...
( Category: Computer Science June 28,2020 )
epub |eng | 2020-06-18 | Author:Maxim Lapan [Maxim Lapan]

( Category: Computer Science June 28,2020 )
epub |eng | | Author:Suril Vijaykumar Shah, Subir Kumar Saha & Jayanta Kumar Dutt

6.3 Computational Efficiency In order to find the computational efficiency of the recursive inverse and forward dynamics algorithms given in Tables 6.1 and 6.2, complexities of the different steps are ...
( Category: Computer Science June 28,2020 )
epub |eng | | Author:Giovanni Battimelli & Giovanni Ciccotti & Pietro Greco

Again , Berendsen recalls: «Although the application to biological molecules—such as proteins—had been developed in several places, Harvard in particular, by the group of Martin Karplus , it is probably ...
( Category: Computer Science June 28,2020 )
epub |eng | | Author:Arnold Vermeeren, Licia Calvi & Amalia Sabiescu

8.4.2.3 Resonance with Prior Experience or Interest Engagement was reported to be energised by photographic content that was in accordance to the participant’s identity and personal interests. This could be ...
( Category: Architecture June 28,2020 )
epub |eng | | Author:Bastian Ballmann

7.7 HTTP-Auth Sniffing Most HTTP authentications are running in the so called Basic mode. A lot of administrators do not even know that the login data is transferred in plaintext ...
( Category: Computer Science June 28,2020 )
epub |eng | | Author:Yoichi Sumi

References Amestoy M, Leblond JB (1992) Crack paths in plane situations-II. Detailed form of the expansion of the stress intensity factors. Int J Solids Struct 29:465–501CrossRefMATHMathSciNet Banichuk NV (1970) Determination ...
( Category: Computer Science June 28,2020 )
epub |eng | 2020-06-19 | Author:Kanaujia, Er. Avnindra [Kanaujia, Er. Avnindra]

Q140. A database can be best described as Organized collection of data Useful presentation of data Graphical representation of data All of above Q141. Which of the following term is ...
( Category: Computer Science June 28,2020 )
epub |eng | | Author:Martin Schallbruch & Isabel Skierka

4.2 The German Military’s Role in the Cyber Realm The German Bundeswehr is a defence army and a parliamentary army. Its fields of operation are very limited by the German ...
( Category: Computer Science June 27,2020 )
epub |eng | | Author:Tin-Chih Toly Chen

2. D. Jamie, How to choose a 3D printer: experts give their advice (2018). https://​www.​3dnatives.​com/​en/​how-to-choose-a-3d-printer-260120184/​ 3. Pick3DPrinter.com, What is 3D printing? A quick guide for beginners (2019). https://​pick3dprinter.​com/​what-is-3d-printing/​ 4. D ...
( Category: Computer Science June 27,2020 )
epub |eng | | Author:S. Arungalai Vendan & Rajeev Kamal & Abhinav Karan & Liang Gao & Xiaodong Niu & Akhil Garg

The predictions for each dataset are observed as shown in Tables 2.10, 2.11, 2.12, 2.13, 2.14, 2.15, 2.16 and 2.17.Table 2.10Results of CMT_DOP_predicted data CMT_DOP_2 CMT_DOP_Predicted 1.35 1.574503 0.85 0.834215 ...
( Category: Computer Science June 27,2020 )
epub |eng | | Author:Unknown

3.2 History The history of vSLAM algorithms is summarized in Table 1, and their relationship is illustrated in Fig. 5. The algorithms are categorized from two aspects: localization and mapping ...
( Category: Management & Leadership June 27,2020 )