Search Results - (((((((ant OR manthe) OR file) OR semantic) OR cantor) OR anne) OR halted) OR wwanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 89
- Mathematical models 64
- Mathematics 61
- Artificial intelligence 55
- Algorithms 43
- Machine learning 40
- algorithms 37
- Data mining 34
- artificial intelligence 33
- methods 31
- Mathematical optimization 28
- Computer networks 24
- Artificial Intelligence 23
- Computer science 22
- Signal processing 21
- Data Mining 20
- Python (Computer program language) 20
- Development 19
- Digital techniques 19
- Technological innovations 19
- Application software 17
- Computer algorithms 17
- Computer simulation 16
- Diseases 16
- Image processing 16
- Computational Biology 15
- Statistical methods 14
- Computer security 13
- Electronic data processing 13
- Information technology 13
Search alternatives:
- ant »
- manthe »
- semantic »
- cantor »
- wwanting »
- halted »
-
101
-
102
Mastering machine learning with R : advanced prediction, algorithms, and learning methods with R 3.x
Published 2017Full text (MFA users only)
Electronic eBook -
103
Adventures in Raspberry Pi
Published 2017Table of Contents: “…-- Setting Up the Raspberry Pi -- Downloading and Copying the Raspbian Operating System -- Plugging in the Hardware -- Installing and Configuring the Software -- Exploring the Desktop in Raspbian -- Shutting Down Your Raspberry Pi -- Connecting to a Wi-Fi Network -- Backing Up an SD Card Image -- Adventure 2 Taking Command of Your Raspberry Pi -- Exploring the Terminal -- Commands for Navigating Through Your File System -- Understanding sudo -- Launching Programs from the Command Line -- Managing Files and Directories -- Installing and Updating Applications -- Downloading and Installing Applications -- Learning More About an Application -- Upgrading Your Apps -- Editing Files -- Using Shutdown and Restart Commands -- Continuing Your Text Adventure -- Adventure 3 Creating Stories and Games with Scratch -- Getting Started with Scratch -- The Scratch Interface -- A Quick Hello from Scratch Cat -- Setting the Stage -- Creating Costumes and Original Sprites -- Using the Scratch Sprite Image Library -- Editing an Existing Sprite -- Creating Your Own Original Sprites -- Animating a Crazy Monkey -- Creating an Adventure Role-Playing Game -- Creating Your Sprite and Stage -- Setting the Start Position of the Adventurer Sprite -- Creating Variables: Including Health Points for the Adventurer Sprite -- Controlling the Direction and Movement of the Adventurer Sprite -- Entering a Cave and Switching Backgrounds.…”
Full text (MFA users only)
Electronic eBook -
104
Mental ray for Maya, 3ds max, and XSI : a 3D artist's guide to rendering
Published 2008Full text (MFA users only)
Electronic eBook -
105
Turing's vision : the birth of computer science
Published 2016Full text (MFA users only)
Electronic eBook -
106
Mathematica data visualization : create and prototype interactive data visualizations using Mathematica
Published 2014Full text (MFA users only)
Electronic eBook -
107
Language production and interpretation : linguistics meets cognition
Published 2014Table of Contents: “…Provisional English; 2.3. The Production Algorithm; 2.3.1. Procedural Interpretation of the Constraints; 2.4. …”
Full text (MFA users only)
Electronic eBook -
108
Intelligence emerging : adaptivity and search in evolving neural systems
Published 2015Full text (MFA users only)
Electronic eBook -
109
Learning predictive analytics with python : gain practical insights into predictive modelling by implementing Predictive Analytics algorithms on public datasets with Python
Published 2016Table of Contents: “…Various methods of importing data in PythonCase 1 -- reading a dataset using the read_csv method; The read_csv method; Use cases of the read_csv method; Case 2 -- reading a dataset using the open method of Python; Reading a dataset line by line; Changing the delimiter of a dataset; Case 3 -- reading data from a URL; Case 4 -- miscellaneous cases; Reading from an .xls or .xlsx file; Writing to a CSV or Excel file; Basics -- summary, dimensions, structure; Handling missing values; Checking for missing values; What constitutes missing data?…”
Full text (MFA users only)
Electronic eBook -
110
Foundations of Probabilistic Logic Programming : Languages, Semantics, Inference and Learning.
Published 2018Full text (MFA users only)
Electronic eBook -
111
Robust range image registration : using genetic algorithms and the surface interpenetration measure
Published 2005Full text (MFA users only)
Electronic eBook -
112
Adaptive tests of significance using permutations of residuals with R and SAS
Published 2012Full text (MFA users only)
Electronic eBook -
113
ReCombinatorics : the algorithmics of ancestral recombination graphs and explicit phylogenetic networks
Published 2014Full text (MFA users only)
Electronic eBook -
114
High-frequency trading : a practical guide to algorithmic strategies and trading systems
Published 2010Full text (MFA users only)
Electronic eBook -
115
Portable Moving Images : a Media History of Storage Formats
Published 2017Full text (MFA users only)
Electronic eBook -
116
Machine Learning and Big Data with KDB+/Q : Q, High Frequency Financial Data and Algorithmic Trading.
Published 2019Full text (MFA users only)
Electronic eBook -
117
Mastering Active Directory
Published 2017Table of Contents: “…-- The update sequence number -- Directory Service Agent GUID and invocation ID -- The high watermark vector table -- The up-to-dateness vector table -- The read-only domain controllers -- Active Directory database maintenance -- The ntds.dit file -- The edb.log file -- The edb.chk file -- The temp.edb file -- Offline defragmentation -- Active Directory backup and recovery -- Preventing accidental deletion of objects -- Active Directory Recycle Bin -- Active Directory snapshots -- Active Directory system state backup -- Active Directory recovery from system state backup -- Summary -- Chapter 12: Active Directory Certificate Services -- PKI in action -- Symmetric keys versus asymmetric keys -- Digital encryption -- Digital signatures -- Signing, encryption, and decryption -- Secure Sockets Layer certificates -- Types of certification authorities -- How do certificates work with digital signatures and encryption? …”
Full text (MFA users only)
Electronic eBook -
118
-
119
Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
Published 2018Table of Contents: “…A real-world pen test scenario -- the chatty printerConfiguring our SMB listener; Authentication capture; Hash capture with LLMNR/NetBIOS NS spoofing; Let it rip -- cracking Windows hashes; The two philosophies of password cracking; John the Ripper cracking with a wordlist; John the Ripper cracking with masking; Reviewing your progress with the show flag; Summary; Questions; Further reading; Chapter 4: Advanced Network Attacks; Technical requirements; Binary injection with BetterCAP proxy modules; The Ruby file injection proxy module -- replace_file.rb…”
Full text (MFA users only)
Electronic eBook -
120
Evaluation and management for infectious diseases and dermatologic disorders
Published 2017Full text (MFA users only)
Electronic eBook