Computer Science
epub |eng | 2020-07-06 | Author:PARK, DAN [PARK, DAN]
Python on Windows Windows running system does no longer have a gadget to guide the setup of Python on machines. Therefore, Python is made available to Windows customers via the ...
( Category:
Computer Science
July 10,2020 )
epub |eng | 2016-08-30 | Author:John Horton & Helder Vasconcelos & Raul Portales [Horton, John]
Now, we can get on with the app for real. Where in the world – implementing a simple layout To create the layout, copy and paste the following XML code ...
( Category:
Computer Science
July 9,2020 )
epub |eng | 2017-01-05 | Author:Wang, Shuang & Fang, Yong & Cheng, Samuel
Variance computation: according to the variance definition of a random variable , where is the expectation operator, the variance at different granularity levels can be obtained by averaging the variance ...
( Category:
Computer Science
July 9,2020 )
epub |eng | 2020-07-05 | Author:ANSARI, HASANRAZA [ANSARI, HASANRAZA]
Single Layer Perceptron For understanding single layer perceptron, it is important to understand Artificial Neural Networks (ANN). Artificial neural networks is the information processing system the mechanism of which is ...
( Category:
Machine Theory
July 9,2020 )
epub, azw3 |eng | 2020-05-24 | Author:Wilkins, Neil [Wilkins, Neil]
Conclusion Science fiction writers have been wringing their hands over artificial intelligence for decades, even before public figures ever discussed the concept. They imagined AI as a booster force that ...
( Category:
Neural Networks
July 9,2020 )
azw3, mobi |eng | 2017-01-04 | Author:Shuang Wang & Yong Fang & Samuel Cheng [Wang, Shuang]
Variance computation: according to the variance definition of a random variable , where is the expectation operator, the variance at different granularity levels can be obtained by averaging the variance ...
( Category:
Computer Science
July 9,2020 )
epub |eng | | Author:Cameron Buchanan
Connecting to WEP and WPA networks We can also connect to the authorized network after we have cracked the network key. This can come in handy during penetration testing. Logging ...
( Category:
Testing
July 8,2020 )
epub |eng | | Author:Suren Machiraju & Suraj Gaurav
4.Click the Connect button to connect Visual Studio with Visual Studio Team Services, as shown in Figure 3-10. Figure 3-10Connecting Visual Studio to Visual Studio Team Services After we click ...
( Category:
C & C++ Windows Programming
July 8,2020 )
epub |eng | | Author:Guy Lebanon & Mohamed El-Geish
8.11 qq-Plots Quantile-quantile plots, also known as qq-plots, are useful for comparing two datasets, one of which may be sampled from a certain distribution. They are essentially scatter plots of ...
( Category:
Intelligence & Semantics
July 8,2020 )
epub |eng | 2020-05-07 | Author:Robert Scoble, Irena Cronin
Augmented Reality Visions and Informed Robots Within a decade, working in a factory will probably be very different than it is today. Many, if not most, workers will probably be ...
( Category:
Human-Computer Interaction
July 8,2020 )
epub |eng | | Author:Ranjan Ganguli
11. Yeum, C. M., Sohn, H., Ihn, J. B., & Lim, H. J. (2012). Instantaneous delamination detection in a composite plate using dual piezoelectric transducer network. Composite Structures, 94(12), 3490–3499.Crossref ...
( Category:
Architecture
July 8,2020 )
epub |eng | 2020-06-29 | Author:Gigi Sayfan
Serializing API objects with protocol buffers The API server has a REST API. REST APIs typically use JSON as their serialization format, and the Kubernetes API server was no different. ...
( Category:
Computer Science
July 8,2020 )
epub |eng | 2020-05-15 | Author:Yasser Shoukry and Jaiprakash Pandey [Yasser Shoukry and Jaiprakash Pandey]
( Category:
Computer Simulation
July 8,2020 )
epub |eng | 2019-12-12 | Author:John Hany [John Hany]
The authors of the paper have kindly provided the full source code for their work, which runs perfectly on PyTorch 1.3. The source code is also well organized. Therefore, we ...
( Category:
Computer Science
July 8,2020 )
epub |eng | | Author:Unknown
Stitching the images Now that we have the transformation, we can go ahead and stitch the images. We will use the transformation matrix to transform the second list of points. ...
( Category:
Computer Science
July 8,2020 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12585)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8305)
Test-Driven Development with Java by Alan Mellor(6764)
Data Augmentation with Python by Duc Haba(6681)
Principles of Data Fabric by Sonia Mezzetta(6426)
Learn Blender Simulations the Right Way by Stephen Pearson(6325)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6198)
Hadoop in Practice by Alex Holmes(5964)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5811)
RPA Solution Architect's Handbook by Sachin Sahgal(5595)
Big Data Analysis with Python by Ivan Marin(5382)
The Infinite Retina by Robert Scoble Irena Cronin(5287)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5153)
Pretrain Vision and Large Language Models in Python by Emily Webber(4347)
Infrastructure as Code for Beginners by Russ McKendrick(4112)
Functional Programming in JavaScript by Mantyla Dan(4041)
The Age of Surveillance Capitalism by Shoshana Zuboff(3960)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3824)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3628)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3601)
