Computer Science
epub |eng | 2017-04-14 | Author:Dennis Tenen [Tenen, Dennis]
PROGRAMMABLE MEDIA To begin, we need some background on telegraphy. The turn of the twentieth century was a pivotal period in the history of letters. It saw the languages of ...
( Category:
Communication & Media Studies
April 3,2020 )
epub |eng | 2020-03-30 | Author:BALDWIN, WILL [BALDWIN, WILL]
You have to tap on the cell C3 with the mouse pointer to add the named range rate to the formula. Just click on the Enter key on the keyboard ...
( Category:
Computer Science
April 3,2020 )
epub |eng | 2015-04-14 | Author:Andrés Angelani, Guibert Englebienne, Martín Migoya
Pods are motivated to improve continuously by raising their maturity level, directly benefiting the business by incentivizing partners and motivating employees. * * * MATURITY CRITERIA MATURITY CRITERIA SAMPLE REWARDS ...
( Category:
E-Commerce
April 3,2020 )
epub |eng | | Author:Sven Behnke, Raymond Sheh, Sanem Sarıel & Daniel D. Lee
5 Evaluation Our system has been evaluated on different MAV platforms, e.g., for autonomous outdoor navigation and mapping as shown in Fig. 1. Furthermore, it has been deployed on our ...
( Category:
Computer Science
April 3,2020 )
epub |eng | | Author:M. Sohel Rahman, Wing-Kin Sung & Ryuhei Uehara
6. Garey, M., Johnson, D., Sethi, R.: The complexity of flowshop and jobshop scheduling. Math. Oper. Res. 1(2), 117–129 (1976)MathSciNetCrossrefMATH 7. Gu, H., Memar, J., Zinder, Y.: Efficient Lagrangian heuristics ...
( Category:
Computer Science
April 3,2020 )
epub |eng | 2020-03-29 | Author:Hack, Samuel [Hack, Samuel]
The equation of a polynomial will look like the linear equation, with the difference being that there will be some polynomial expression attached to one or more of our X ...
( Category:
Robotics
April 3,2020 )
epub |eng | | Author:Katinka Wolter
Katinka Wolter Email: [email protected] Abstract A number of stochastic models for preventive maintenance and specifically for software rejuvenation are presented and discussed in this chapter. Preventive maintenance is a method ...
( Category:
Computer Science
April 3,2020 )
epub |eng | 2020-03-30 | Author:Goldmeyr, Martin [Goldmeyr, Martin]
That is how we can have a basic Python function. Function Parameters You can dynamically define arguments for a function. Example: #!/usr/bin/python3 def getSum(p, q): result = p + q ...
( Category:
Computer Science
April 3,2020 )
epub |eng | 2005-02-27 | Author:David D. Woods & Erik Hollnagel [David D. Woods]
( Category:
Health & Safety
April 3,2020 )
epub, mobi |eng | 2019-08-12 | Author:Ajay Baranwal [Ajay Baranwal]
Technical requirements It's assumed that readers of this chapter and this book know the basics of machine learning, neural networks, and deep neural networks. Also, as a prerequisite, it's assumed ...
( Category:
Intelligence & Semantics
April 2,2020 )
epub |eng | | Author:Unknown
( Category:
Computer Science
April 2,2020 )
epub |eng | | Author:Fatos Xhafa, Srikanta Patnaik & Albert Y. Zomaya
3.2 Menu Management Module Menu information is managed in the module, which includes menu information adding, modifying, querying and deleting. Menu information consists of foods types and foods details, which ...
( Category:
Computer Science
April 2,2020 )
epub |eng | | Author:Mostafa Ezziyyani, Mohamed Bahaj & Faddoul Khoukhi
Keywords Wireless sensor networksMobiles nodesKey managementElliptic curve cryptography Nomenclature AVL denotes a binary tree (authors names are: Adelson, Velskij and Landis). CH i denotes a cluster head. d ij denotes ...
( Category:
Computer Science
April 2,2020 )
epub |eng | | Author:Unknown
Intrinsic (Brain tissues) Extrinsic (Image physical characteristics) –Proton Density (PD) –Magnetic Field Strength (MFS) –Longitudinal Relaxation Tme (T1) –Radio Frequency (RF) –Transverse Relaxation Time (T2) –Repetition Time (TR) –Chemical Shift ...
( Category:
Finance
April 2,2020 )
epub |eng | | Author:Syed Riffat Ali
5.4.6 Timers In the event the network is not able to respond due to excessive faults, watchdog timers are involved which operate independent of the network and monitor certain defined ...
( Category:
Computer Science
April 2,2020 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12590)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8309)
Test-Driven Development with Java by Alan Mellor(6804)
Data Augmentation with Python by Duc Haba(6720)
Principles of Data Fabric by Sonia Mezzetta(6466)
Learn Blender Simulations the Right Way by Stephen Pearson(6373)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6239)
Hadoop in Practice by Alex Holmes(5965)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5814)
RPA Solution Architect's Handbook by Sachin Sahgal(5641)
Big Data Analysis with Python by Ivan Marin(5401)
The Infinite Retina by Robert Scoble Irena Cronin(5329)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5160)
Pretrain Vision and Large Language Models in Python by Emily Webber(4366)
Infrastructure as Code for Beginners by Russ McKendrick(4135)
Functional Programming in JavaScript by Mantyla Dan(4044)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3846)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3650)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3625)
