Computer Science
epub, pdf |eng | 2017-08-16 | Author:Yannick Lefebvre [Yannick Lefebvre]
See also The Creating a custom post type recipe Adding custom fields to categories In addition to specifying names for categories, it may be useful to attach additional information to ...
( Category:
PHP Programming
June 28,2020 )
epub |eng | | Author:Unknown
(1) Fig. 4Convolution of a matrix Activation Function: Rectified Linear Unit ReLU is used in the model to increase non-linearity in the ConvNet and it acts on a fundamental step. ...
( Category:
Economics
June 28,2020 )
epub |eng | 0101-01-01 | Author:Paul J. Springer [Springer, Paul J.]
Sources Blaker, James R. 2007. Transforming Military Force: The Legacy of Arthur Cebrowski and Network Centric Warfare. Westport, CT: Praeger Security International. Singer, Peter W. 2009. Wired for War. New ...
( Category:
Robotics & Automation
June 28,2020 )
epub |eng | | Author:Carsten Schneider & Eugene Zima
For every fixed , denote by V(p) the set of all sequences with , i.e., the solution space of the recurrence equation encoded by p. This is a vector space ...
( Category:
Computer Science
June 28,2020 )
epub |eng | 2020-06-18 | Author:Maxim Lapan [Maxim Lapan]
( Category:
Computer Science
June 28,2020 )
Dynamics of Tree-Type Robotic Systems by Suril Vijaykumar Shah Subir Kumar Saha & Jayanta Kumar Dutt
epub |eng | | Author:Suril Vijaykumar Shah, Subir Kumar Saha & Jayanta Kumar Dutt
6.3 Computational Efficiency In order to find the computational efficiency of the recursive inverse and forward dynamics algorithms given in Tables 6.1 and 6.2, complexities of the different steps are ...
( Category:
Computer Science
June 28,2020 )
epub |eng | | Author:Giovanni Battimelli & Giovanni Ciccotti & Pietro Greco
Again , Berendsen recalls: «Although the application to biological molecules—such as proteins—had been developed in several places, Harvard in particular, by the group of Martin Karplus , it is probably ...
( Category:
Computer Science
June 28,2020 )
epub |eng | | Author:Arnold Vermeeren, Licia Calvi & Amalia Sabiescu
8.4.2.3 Resonance with Prior Experience or Interest Engagement was reported to be energised by photographic content that was in accordance to the participant’s identity and personal interests. This could be ...
( Category:
Architecture
June 28,2020 )
epub |eng | | Author:Bastian Ballmann
7.7 HTTP-Auth Sniffing Most HTTP authentications are running in the so called Basic mode. A lot of administrators do not even know that the login data is transferred in plaintext ...
( Category:
Computer Science
June 28,2020 )
epub |eng | | Author:Yoichi Sumi
References Amestoy M, Leblond JB (1992) Crack paths in plane situations-II. Detailed form of the expansion of the stress intensity factors. Int J Solids Struct 29:465–501CrossRefMATHMathSciNet Banichuk NV (1970) Determination ...
( Category:
Computer Science
June 28,2020 )
epub |eng | 2020-06-19 | Author:Kanaujia, Er. Avnindra [Kanaujia, Er. Avnindra]
Q140. A database can be best described as Organized collection of data Useful presentation of data Graphical representation of data All of above Q141. Which of the following term is ...
( Category:
Computer Science
June 28,2020 )
epub |eng | | Author:Martin Schallbruch & Isabel Skierka
4.2 The German Military’s Role in the Cyber Realm The German Bundeswehr is a defence army and a parliamentary army. Its fields of operation are very limited by the German ...
( Category:
Computer Science
June 27,2020 )
epub |eng | | Author:Tin-Chih Toly Chen
2. D. Jamie, How to choose a 3D printer: experts give their advice (2018). https://www.3dnatives.com/en/how-to-choose-a-3d-printer-260120184/ 3. Pick3DPrinter.com, What is 3D printing? A quick guide for beginners (2019). https://pick3dprinter.com/what-is-3d-printing/ 4. D ...
( Category:
Computer Science
June 27,2020 )
epub |eng | | Author:S. Arungalai Vendan & Rajeev Kamal & Abhinav Karan & Liang Gao & Xiaodong Niu & Akhil Garg
The predictions for each dataset are observed as shown in Tables 2.10, 2.11, 2.12, 2.13, 2.14, 2.15, 2.16 and 2.17.Table 2.10Results of CMT_DOP_predicted data CMT_DOP_2 CMT_DOP_Predicted 1.35 1.574503 0.85 0.834215 ...
( Category:
Computer Science
June 27,2020 )
epub |eng | | Author:Unknown
3.2 History The history of vSLAM algorithms is summarized in Table 1, and their relationship is illustrated in Fig. 5. The algorithms are categorized from two aspects: localization and mapping ...
( Category:
Management & Leadership
June 27,2020 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12589)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8309)
Test-Driven Development with Java by Alan Mellor(6792)
Data Augmentation with Python by Duc Haba(6709)
Principles of Data Fabric by Sonia Mezzetta(6454)
Learn Blender Simulations the Right Way by Stephen Pearson(6360)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6228)
Hadoop in Practice by Alex Holmes(5965)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5813)
RPA Solution Architect's Handbook by Sachin Sahgal(5629)
Big Data Analysis with Python by Ivan Marin(5396)
The Infinite Retina by Robert Scoble Irena Cronin(5317)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5158)
Pretrain Vision and Large Language Models in Python by Emily Webber(4362)
Infrastructure as Code for Beginners by Russ McKendrick(4127)
Functional Programming in JavaScript by Mantyla Dan(4044)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3840)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3646)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3616)
