Computer Science
epub |eng | 2015-05-25 | Author:Dwayne Day [Day Dwayne]
A mockup of the Sputnik II payload complete with Soviet dog. When the Soviet Union launched Sputniks I and II, they raised fears of surprise attack among many in the ...
( Category:
AI & Machine Learning
August 2,2020 )
epub |eng | 2011-08-14 | Author:Jason Andress & Steve Winterfeld
How the Military Approaches Social Engineering The military has been in the spy–counterspy business from the beginning; they are also experts at interrogation. Spying is the long con, whereas interrogation ...
( Category:
Network Security
August 2,2020 )
epub |eng | 2013-11-19 | Author:Anna Kaziunas France
Chapter 11. Service Providers These companies will print your models in a range of exotic materials. Colleen Jordan, Stett Holbrook, and Anna Kaziunas France If you don’t have a 3D ...
( Category:
Architecture
August 2,2020 )
mobi, epub, pdf |eng | 2002-08-01 | Author:Williams, Sam [Williams, Sam]
Chapter 8 St. Ignucius The Maui High Performance Computing Center is located in a single-story building in the dusty red hills just above the town of Kihei. Framed by million-dollar ...
( Category:
Software Development
August 2,2020 )
epub |eng | | Author:Andrew Adamatzky
4 Dispersion of Mobile Sensor Networks Mobile wireless sensor networks have a wide range of applications [33, 37] and there has been much research on this topic. The mobile sensors ...
( Category:
Intelligence & Semantics
August 1,2020 )
epub |eng | | Author:Srikanta Patnaik, Xin-She Yang & Kazumi Nakamatsu
3.7 Multi-objective Invasive Weed Optimization The multi-objective invasive weeds optimization proposed by Kundu et al. [25] is based upon the soil occupying and new colony generation behaviour of the weeds. ...
( Category:
Intelligence & Semantics
August 1,2020 )
epub, pdf |eng | | Author:Dejan Radojčić
Fig. 3.2 Comparison of four MMs with the Series 62/DSDS measurements—β = 12.5°, AP/∇2/3 = 5.5, %LCG = 4%, LP/BPX = 4.1 [single- and multiple-output—Radojčić et al. (2017b), DSDS—Keuning and ...
( Category:
Computer Science
August 1,2020 )
epub |eng | | Author:Uttama Lahiri
4.2.4 Reduction in Human Interaction Predictability in one’s behaviour has an important role in making effective social exchanges. Predictability refers to the essence of estimating the accurate description of events ...
( Category:
Computer Science
August 1,2020 )
epub |eng | | Author:Hari Vasudevan, Amit A. Deshmukh & K. P. Ray
11. Deshmukh, A.A., Kumar, G.: Compact broadband U-slot loaded rectangular microstrip antennas. Microw. Opt. Technol. Lett. 46(6), 556–559 (2005)Crossref 12. Chair, R., Mak, C.L., Lee, K.F., Luk, K.M., Kishk, A.A.: ...
( Category:
Computer Science
August 1,2020 )
epub |eng | | Author:Vassil Sgurev, Ronald R. Yager, Janusz Kacprzyk & Krassimir T. Atanassov
SGA_SCM SGA_MCS Before PMPG After PMPG Before PMPG After PMPG J 0.0225 0.0222 0.0225 0.0222 time, s 25.98 18.45 25.88 19.66 μ 2S 0.96 0.95 0.92 0.91 μ 2E 0.11 ...
( Category:
Computer Science
August 1,2020 )
epub |eng | 2020-08-15 | Author:Alberto Strumia
Fig. 5.4 - POV 3.7 3D Mandelbrot set with cylindrical symmetry (two different glass renderings) POV-Ray 3.7 code to generate figs. 5.3 and 5.4 //=================================== // Mandelbrot 3D set as ...
( Category:
Computer Science
August 1,2020 )
epub |eng | 2018-09-27 | Author:Jones, Herbert [Jones, Herbert]
Computer systems intrusion detection In sci-fi books such as William Gibson’s Neuromancer , hackers plug into the internet via a literal plug inserted into the base of the skull and ...
( Category:
Neural Networks
August 1,2020 )
epub |eng | | Author:Jean-Paul Laumond, Nicolas Mansard & Jean-Bernard Lasserre
Log-precisions: These parameters control the precision (inverse variance) of fluctuations that constitute the random part of a generative model Hidden states: These hidden variables encode the hierarchical states in a ...
( Category:
Computer Science
August 1,2020 )
epub |eng | | Author:Ben Vermeulen & Manfred Paier
Bathelt H, Malmberg A, Maskell P (2004) Clusters and knowledge: local buzz, global pipelines and the process of knowledge creation. Progr Hum Geogr 28(1):31–56CrossRef Boschma R (2005) Proximity and innovation: ...
( Category:
Economics
August 1,2020 )
epub |eng | | Author:Marcin Szuster & Zenon Hendzel
– NN input layer weights randomly selected from the interval , – zero initial values of the output layer weights, , – positive constant, type of critic’s NNs applied: RVFL, ...
( Category:
Computer Science
August 1,2020 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12585)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8305)
Test-Driven Development with Java by Alan Mellor(6760)
Data Augmentation with Python by Duc Haba(6673)
Principles of Data Fabric by Sonia Mezzetta(6423)
Learn Blender Simulations the Right Way by Stephen Pearson(6320)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6194)
Hadoop in Practice by Alex Holmes(5963)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5810)
RPA Solution Architect's Handbook by Sachin Sahgal(5591)
Big Data Analysis with Python by Ivan Marin(5378)
The Infinite Retina by Robert Scoble Irena Cronin(5281)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5153)
Pretrain Vision and Large Language Models in Python by Emily Webber(4345)
Infrastructure as Code for Beginners by Russ McKendrick(4108)
Functional Programming in JavaScript by Mantyla Dan(4040)
The Age of Surveillance Capitalism by Shoshana Zuboff(3960)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3821)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3625)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3599)
