Networking & Cloud Computing
epub |eng | | Author:Unknown
8.2 Extraction from Machining Raw Measurements To continuously monitor the machine behaviour, it is possible to extract indicators from the raw existing sensors measurement during the machine workpiece production. Given ...
( Category:
History & Criticism
July 4,2020 )
epub |eng | 2018-09-26 | Author:Jithin Alex [Alex, Jithin]
<--- Create a for loop to create multiple VLANs in a go. In python2, the default encoding is ASCII but in Python3, the default encoding is Unicode. This is the ...
( Category:
Networks, Protocols & APIs
July 4,2020 )
epub |eng | | Author:Maurizio Dapor
(7.39) Substituting (7.39) in (7.30), we can conclude that the fraction of backscattered particles for a thin film of material x supported on a substrate of material y [8, 9] ...
( Category:
Networking & Cloud Computing
July 4,2020 )
epub |eng | | Author:Izzat Alsmadi & Chuck Easttom & Lo’ai Tawalbeh
The more modern and desirable approach though, would be using machine learning. Machine learning allows computers to process new conditions through analysis, self-training and observation [9]. This allows the machine ...
( Category:
Internet, Groupware, & Telecommunications
July 4,2020 )
epub |eng | | Author:Michael T. Nygard
Enabling Technologies By its nature, a process running on an instance is totally opaque. Unless you’re running a debugger on the process, it reveals practically nothing about itself. It might ...
( Category:
Software Development
July 4,2020 )
epub |eng | | Author:Y V Ravikumar, K M Krishnakumar & Nassyam Basha
channel ORA_DISK_1: starting datafile backup set restore channel ORA_DISK_1: specifying datafile(s) to restore from backup set channel ORA_DISK_1: restoring all foreign files in backup piece channel ORA_DISK_1: reading from backup ...
( Category:
Storage & Retrieval
July 4,2020 )
epub |eng | 2019-08-27 | Author:David Furlonger [Furlonger, David; Uzureau, Christophe]
THE FATE OF CENTRALIZED SOLUTIONS As the technology matures to enable blockchain-complete solutions and as organizations experiment with decentralized decision making, processes, and business models, the value proposition of blockchain-inspired ...
( Category:
Storage & Retrieval
July 4,2020 )
epub, pdf |eng | | Author:Rainer Strobel
3.6.2 Mutual Couplings Between G.fast and VDSL2 Due to the different duplexing schemes and the overlapping spectrum between 2.2 and , there is crosstalk between G.fast and VDSL2. As shown ...
( Category:
Electronics
July 4,2020 )
epub |eng | | Author:Kasun Maduranga Silva Thotahewa, Jean-Michel Redouté & Mehmet Rasit Yuce
4.3 UWB Receiver Design Techniques Due to the short pulse width and low power of the signal, front-end circuitry for the UWB receiver is complex in design and has high ...
( Category:
Networking & Cloud Computing
July 4,2020 )
epub |eng | | Author:Unknown
16. Řehůřek, R., Sojka, P.: Software framework for topic modelling with large corpora. In: Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks, ELRA, Valletta, Malta, pp. ...
( Category:
Management & Leadership
July 4,2020 )
epub |eng | 2020-06-10 | Author:Henry Been, Maik van der Gaag [Henry Been, Maik van der Gaag]
public Person(string name, string city) { Name = name ?? throw new ArgumentNullException(); City = city ?? throw new ArgumentNullException(); } [JsonProperty] public string Name { get; private set; } ...
( Category:
Tools
July 4,2020 )
epub |eng | | Author:Bernard C. Levy
(6.44) Let τ = RC denote the time constant of the circuit. The expression (6.44) shows that when t exceeds about 5τ, the variance (6.45) Furthermore, if the initial variance ...
( Category:
Networking & Cloud Computing
July 4,2020 )
epub |eng | | Author:Wei Emma Zhang & Quan Z. Sheng
4.1 Overview of Clustering with Non-negative Matrix Factorization Given a matrix, Non-negative Matrix Factorization (NMF) aims to find two non-negative factor matrices whose product approximates that matrix. This enhances the ...
( Category:
Performance Optimization
July 4,2020 )
epub |eng | 2015-10-27 | Author:Agafonov, Eugene & Koryavchenko, Andrew
Implementing a cache with ReaderWriterLockSlim Caching is a common technique that is being used in many applications to increase performance and efficiency. Usually, reading from a cache occurs more often ...
( Category:
Networking & Cloud Computing
July 4,2020 )
epub |eng | 2014-10-03 | Author:Dover, Thomas [Dover, Thomas]
Echo Echo takes place when you talk to yourself! Echo is a major problem in the following cases: 2W hybrid circuits. Cellular circuits using 2W connections to switches. Terminating equipment. ...
( Category:
Telecommunications & Sensors
July 4,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6840)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6839)
Running Windows Containers on AWS by Marcio Morales(6366)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5070)
Combating Crime on the Dark Web by Nearchos Nearchou(4648)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4616)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4335)
The Age of Surveillance Capitalism by Shoshana Zuboff(3979)
Python for Security and Networking - Third Edition by José Manuel Ortega(3895)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3554)
Learn Wireshark by Lisa Bock(3530)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3355)
Blockchain Basics by Daniel Drescher(3325)
