Computer Science
epub |eng | | Author:Kevin Zhang
6.2 Embedded Flash Memory Technology This section gives an overview of the evolution of embedded-specific flash memory technology, aside from large-scale discrete flash memory. Focus is on the floating-gate devices ...
( Category:
Engineering
August 15,2020 )
epub |eng | 2020-08-11 | Author:Weber, Hans [Weber, Hans]
Sources https://alex.smola.org/drafts/thebook.pdf http://ciml.info/dl/v0_8/ciml-v0_8-all.pdf https://courses.csail.mit.edu/6.034f/ai3/rest.pdf https://artint.info/AIPython/aipython.pdf https://www.cs.cmu.edu/afs/cs/academic/class/15381-s07/www/slides/011607comboIntro.pdf https://stacks.stanford.edu/file/druid:qn160ck3308/qn160ck3308.pdf http://etext.library.adelaide.edu.au/a/aristotle/a8pra/ http://www.research.ibm.com/journal/rd/021/ibmrd0201B.pdf http://www.research.ibm.com/journal/rd/033/ibmrd0303H.pdf http://www.aaai.org/AITopics/html/genalg.html http://www.asc-cybernetics.org/foundations/timeline.htm http://www.stat.ucla.edu/history/essay.pdf
( Category:
Computer Science
August 15,2020 )
epub |eng | | Author:Dominique Borrione
4.5 Compiler The compiler firstly converts the modified CDFG to a parse tree. Then it calculates the minimum size of the register file by using the templates. This size can ...
( Category:
Computer Science
August 15,2020 )
epub |eng | | Author:Ludwig von Bertalanffy
6 The Model of Open System The Living Machine and Its Limitations The present discussion may be started with one of those trivial questions which are often only too difficult ...
( Category:
Business Management & Leadership
August 15,2020 )
epub |eng | | Author:Albert C. J. Luo
(2.194) For , the corresponding fixed-point are and From Eq. (2.194), the linearized equation in vicinity of the fixed-point with is (2.195) (i)For the branches of the two fixed-points are ...
( Category:
Engineering
August 15,2020 )
epub |eng | | Author:Xin-She Yang
(12) where from the interval [−1, 1] is a is a random number, are the scaling parameters, u k is upper bounds and l k is lower bounds. We can ...
( Category:
Computer Science
August 15,2020 )
epub |eng | | Author:Gerard O'Regan
7.5 Undefined Values Total functions f : X → Y are functions that are defined for every element in their domain, and total functions are widely used in mathematics. However, ...
( Category:
Computer Science
August 14,2020 )
epub |eng | | Author:Unknown
To have a better QoE , FRAN is adapted with four transmission modes such as the following:Device-to-device relay mode Distributed (local) coordination mode Centralized (global) mode Macro Remote Radio Heads ...
( Category:
Internet & Telecommunications
August 14,2020 )
epub |eng | 2017-02-10 | Author:John Miller [Miller, John]
( Category:
Business Management & Leadership
August 14,2020 )
epub |eng | 2020-08-12 | Author:Murphy , Mark [Murphy , Mark]
( Category:
AI & Machine Learning
August 14,2020 )
azw3, pdf |eng | 2020-08-11 | Author:Dan Phillips [Phillips, Dan]
The decision trees typically require little effort on the part of users to prepare data. Variational parameter relationships don't affect tree efficiency. Cons of Decision Trees Learners on the decision-tree ...
( Category:
Computer Science
August 13,2020 )
epub |eng | | Author:Vikram Arkalgud Chandrasetty
10. Meyer-Baese U (2006) Digital signal processing with field programmable gate arrays, 2nd edn. Springer, Berlin/New York 11. Andraka Consulting Group, Inc. (2007) The CORDIC algorithm. http://www.andraka.com/cordic.htm. Accessed 2 April ...
( Category:
Engineering
August 12,2020 )
epub |eng | 2018-03-30 | Author:unknow
( Category:
AI & Machine Learning
August 11,2020 )
epub |eng | 2020-04-28 | Author:Seth Reichelson [Seth Reichelson]
Example Nineteen Searching for a Word in a Text-Based Coding List Line 1: PROCEDURE findNumber (list, word) Line 2: { Line 3:index ← 1 Line 4:FOR EACH item IN list ...
( Category:
College & High School Test Guides
August 11,2020 )
epub |eng | 2020-07-30 | Author:Stefan Jansen
In addition to directly controlling the size of the ensemble, there are various regularization techniques, such as shrinkage, that we encountered in the context of the ridge and lasso linear ...
( Category:
Python Programming
August 10,2020 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12585)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8305)
Test-Driven Development with Java by Alan Mellor(6755)
Data Augmentation with Python by Duc Haba(6669)
Principles of Data Fabric by Sonia Mezzetta(6420)
Learn Blender Simulations the Right Way by Stephen Pearson(6315)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6190)
Hadoop in Practice by Alex Holmes(5962)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5809)
RPA Solution Architect's Handbook by Sachin Sahgal(5590)
Big Data Analysis with Python by Ivan Marin(5376)
The Infinite Retina by Robert Scoble Irena Cronin(5278)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5153)
Pretrain Vision and Large Language Models in Python by Emily Webber(4345)
Infrastructure as Code for Beginners by Russ McKendrick(4106)
Functional Programming in JavaScript by Mantyla Dan(4040)
The Age of Surveillance Capitalism by Shoshana Zuboff(3960)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3819)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3623)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3598)
