Found 158 presentations matching your search
Module 1 notes
Fuzzy clustering, also known as soft clustering, is a method of clustering where each data point can...
BCH codes, part of the cyclic codes, are very powerful error correcting codes widely used in the inf...
qsxcftbnjkoiuytrfvbnhgd
What is AI ? Why we need AI? What is the history of AI? What are Agents ? What are e...
Data Structures and Algorithms are the building blocks of efficient software. By choosing the right ...
Quantum computer
Testing Strategies
expalined partitioning method in data mining with k-means algorithms
Cse student course
Building cmponent based applications with MCE, Inline, Platypus, Alien and MCE
Building novel, component-based applications using Object Orientation, PDL, Alien, FFI,�Inline and...
Ada
lecture3-isa.pptx
This is ISAM resources
Nomad is a workload orchestrator designed by HashiCorp to deploy and manage containers and non-conta...
This is About un informed cost techniques in Artificial intelligence
RTS fault tolerance, Reliability evaluation
Redundancy, Error Detection, Damage Confinement and Assessment, Backward Error Recovery (BER),
this is module to of data in mining and scratty Vashi computer science in engineering so this covers...
Introduction to software engineering and Computing
A book on analysis of algorithms