Computer Science
epub |eng | 2017-04-14 | Author:Dennis Tenen [Tenen, Dennis]

PROGRAMMABLE MEDIA To begin, we need some background on telegraphy. The turn of the twentieth century was a pivotal period in the history of letters. It saw the languages of ...
( Category: Communication & Media Studies April 3,2020 )
epub |eng | 2020-03-30 | Author:BALDWIN, WILL [BALDWIN, WILL]

You have to tap on the cell C3 with the mouse pointer to add the named range rate to the formula. Just click on the Enter key on the keyboard ...
( Category: Computer Science April 3,2020 )
epub |eng | 2015-04-14 | Author:Andrés Angelani, Guibert Englebienne, Martín Migoya

Pods are motivated to improve continuously by raising their maturity level, directly benefiting the business by incentivizing partners and motivating employees. * * * MATURITY CRITERIA MATURITY CRITERIA SAMPLE REWARDS ...
( Category: E-Commerce April 3,2020 )
epub |eng | | Author:Sven Behnke, Raymond Sheh, Sanem Sarıel & Daniel D. Lee

5 Evaluation Our system has been evaluated on different MAV platforms, e.g., for autonomous outdoor navigation and mapping as shown in Fig. 1. Furthermore, it has been deployed on our ...
( Category: Computer Science April 3,2020 )
epub |eng | | Author:M. Sohel Rahman, Wing-Kin Sung & Ryuhei Uehara

6. Garey, M., Johnson, D., Sethi, R.: The complexity of flowshop and jobshop scheduling. Math. Oper. Res. 1(2), 117–129 (1976)MathSciNetCrossrefMATH 7. Gu, H., Memar, J., Zinder, Y.: Efficient Lagrangian heuristics ...
( Category: Computer Science April 3,2020 )
epub |eng | 2020-03-29 | Author:Hack, Samuel [Hack, Samuel]

The equation of a polynomial will look like the linear equation, with the difference being that there will be some polynomial expression attached to one or more of our X ...
( Category: Robotics April 3,2020 )
epub |eng | | Author:Katinka Wolter

Katinka Wolter Email: [email protected] Abstract A number of stochastic models for preventive maintenance and specifically for software rejuvenation are presented and discussed in this chapter. Preventive maintenance is a method ...
( Category: Computer Science April 3,2020 )
epub |eng | 2020-03-30 | Author:Goldmeyr, Martin [Goldmeyr, Martin]

That is how we can have a basic Python function. Function Parameters You can dynamically define arguments for a function. Example: #!/usr/bin/python3 def getSum(p, q): result = p + q ...
( Category: Computer Science April 3,2020 )
epub |eng | 2005-02-27 | Author:David D. Woods & Erik Hollnagel [David D. Woods]

( Category: Health & Safety April 3,2020 )
epub, mobi |eng | 2019-08-12 | Author:Ajay Baranwal [Ajay Baranwal]

Technical requirements It's assumed that readers of this chapter and this book know the basics of machine learning, neural networks, and deep neural networks. Also, as a prerequisite, it's assumed ...
( Category: Intelligence & Semantics April 2,2020 )
epub |eng | | Author:Unknown

( Category: Computer Science April 2,2020 )
epub |eng | | Author:Fatos Xhafa, Srikanta Patnaik & Albert Y. Zomaya

3.2 Menu Management Module Menu information is managed in the module, which includes menu information adding, modifying, querying and deleting. Menu information consists of foods types and foods details, which ...
( Category: Computer Science April 2,2020 )
epub |eng | | Author:Mostafa Ezziyyani, Mohamed Bahaj & Faddoul Khoukhi

Keywords Wireless sensor networksMobiles nodesKey managementElliptic curve cryptography Nomenclature AVL denotes a binary tree (authors names are: Adelson, Velskij and Landis). CH i denotes a cluster head. d ij denotes ...
( Category: Computer Science April 2,2020 )
epub |eng | | Author:Unknown

Intrinsic (Brain tissues) Extrinsic (Image physical characteristics) –Proton Density (PD) –Magnetic Field Strength (MFS) –Longitudinal Relaxation Tme (T1) –Radio Frequency (RF) –Transverse Relaxation Time (T2) –Repetition Time (TR) –Chemical Shift ...
( Category: Finance April 2,2020 )
epub |eng | | Author:Syed Riffat Ali

5.4.6 Timers In the event the network is not able to respond due to excessive faults, watchdog timers are involved which operate independent of the network and monitor certain defined ...
( Category: Computer Science April 2,2020 )