Computer Science
epub, pdf |eng | | Author:Ammar Rayes & Samer Salam
Ability to use text processing tools such as diff and version management tools such as CVS. Ability to distinguish between the distribution of configurations and the activation of a certain ...
( Category:
Computer Science
April 24,2020 )
epub, pdf |eng | | Author:O. S. Miettinen
Effect * – Concerning a cause, the change produced by its being present (in lieu of its alternative) – in epidemiology, mainly, the increase in the level of morbidity from ...
( Category:
Computer Science
April 24,2020 )
epub, pdf |eng | | Author:Joe Pitt-Francis & Jonathan Whiteley
The arrow between the boxes shows the child–parent inheritance relationship. The reason for the repetition of “+ Book()” in the base class is to show that Book has three different ...
( Category:
Object-Oriented Design
April 24,2020 )
epub, pdf |eng | | Author:Ton J. Cleophas & Aeilko H. Zwinderman
4.5 Fuzzy Plots Graphs summarizing the fuzzy memberships of (for example) the input values. 4.6 Linguistic Rules The relationships between the fuzzy memberships of the input data and those of ...
( Category:
Computer Science
April 24,2020 )
epub |eng | | Author:László Keviczky & Ruth Bars & Jenő Hetthéssy & Csilla Bányász
It can be seen that the control system operates appropriately (Fig. 7.12). The left side of the figure gives the output and the control signals for reference signal tracking, while ...
( Category:
Computer Science
April 24,2020 )
epub, pdf |eng | | Author:David G. Luenberger & Yinyu Ye
( Category:
Economics
April 24,2020 )
epub |eng | | Author:Robert J. Vanderbei
Fig. 14.9The tree solution at the end of the first iteration. The Second Iteration. The tree solution shown in Figure 14.9 has only one remaining infeasibility: z ba = −10. ...
( Category:
Linear Programming
April 24,2020 )
epub |eng | | Author:David L. Olson & Desheng Dash Wu
The importance of risk management has vastly increased in the past decade. Value at risk techniques have been becoming the frontier technology for conducting enterprise risk management. One of the ...
( Category:
Economics
April 24,2020 )
epub |eng | | Author:Paul M. Selzer & Richard J. Marhöfer & Oliver Koch
Each expression profiling experiment generates an enormous amount of data. One experiment can include dozens of microarrays, which in turn consist of several thousand spots. Therefore, the resulting several hundred ...
( Category:
Anatomy
April 24,2020 )
epub, pdf |eng | | Author:Charu C. Aggarwal
( Category:
Intelligence & Semantics
April 24,2020 )
epub |eng | | Author:Hartmut Stadtler, Christoph Kilger & Herbert Meyr
Collaborative planning can be applied both downstream and upstream, i.e. it may connect planning processes with customers (e.g. sales planning) or suppliers (e.g. procurement planning). According to the planning horizon ...
( Category:
Production & Operations
April 24,2020 )
epub, pdf |eng | | Author:Brahma Dathan & Sarnath Ramnath
The getUpperTriangle method does not pose any problem for our Pixel class, since it will always return null. Our troubles start with existing client classes, whose methods have been using ...
( Category:
Object-Oriented Design
April 24,2020 )
epub, pdf |eng | | Author:Sandro Skansi
The number of neurons in the hidden layer The number of neurons in the output layer Initial values for weights Initial values for biases Note that the neurons are not ...
( Category:
Intelligence & Semantics
April 24,2020 )
Multimedia Big Data Computing for IoT Applications by Sudeep Tanwar & Sudhanshu Tyagi & Neeraj Kumar
epub |eng | | Author:Sudeep Tanwar & Sudhanshu Tyagi & Neeraj Kumar
(2) There are 64 DCT coefficients of the 8 × 8 block: 1 DC coefficient and 63 AC coefficients. The DC coefficient of the entire image contains all available information ...
( Category:
Computer Science
April 24,2020 )
epub |eng | | Author:Charu C. Aggarwal
(7.18) It is also possible to define the average reciprocal hit-rate for a recommended list of size L by adding only those utility values for which v j ≤ L. ...
( Category:
Intelligence & Semantics
April 24,2020 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12590)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8309)
Test-Driven Development with Java by Alan Mellor(6800)
Data Augmentation with Python by Duc Haba(6717)
Principles of Data Fabric by Sonia Mezzetta(6464)
Learn Blender Simulations the Right Way by Stephen Pearson(6369)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6236)
Hadoop in Practice by Alex Holmes(5965)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5814)
RPA Solution Architect's Handbook by Sachin Sahgal(5638)
Big Data Analysis with Python by Ivan Marin(5400)
The Infinite Retina by Robert Scoble Irena Cronin(5325)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5159)
Pretrain Vision and Large Language Models in Python by Emily Webber(4364)
Infrastructure as Code for Beginners by Russ McKendrick(4133)
Functional Programming in JavaScript by Mantyla Dan(4044)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3845)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3648)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3622)
