Search Results - (((((((ant OR mantis) OR santis) OR hands) OR cantor) OR anne) OR file) OR ranting) algorithms.

  1. 121

    Mental ray for Maya, 3ds max, and XSI : a 3D artist's guide to rendering by Livny, Boaz

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  2. 122

    Turing's vision : the birth of computer science by Bernhardt, Chris

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  3. 123
  4. 124

    Kienböck's disease : advances in diagnosis and treatment

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  5. 125
  6. 126
  7. 127
  8. 128

    Learning predictive analytics with python : gain practical insights into predictive modelling by implementing Predictive Analytics algorithms on public datasets with Python by Kumar, Ashish

    Published 2016
    Table of Contents: “…Various methods of importing data in PythonCase 1 -- reading a dataset using the read_csv method; The read_csv method; Use cases of the read_csv method; Case 2 -- reading a dataset using the open method of Python; Reading a dataset line by line; Changing the delimiter of a dataset; Case 3 -- reading data from a URL; Case 4 -- miscellaneous cases; Reading from an .xls or .xlsx file; Writing to a CSV or Excel file; Basics -- summary, dimensions, structure; Handling missing values; Checking for missing values; What constitutes missing data?…”
    Full text (MFA users only)
    Electronic eBook
  9. 129
  10. 130
  11. 131
  12. 132
  13. 133

    Portable Moving Images : a Media History of Storage Formats by Cedeño Montaña, Ricardo

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  14. 134
  15. 135

    Mastering Active Directory by Francis, Dishan

    Published 2017
    Table of Contents: “…-- The update sequence number -- Directory Service Agent GUID and invocation ID -- The high watermark vector table -- The up-to-dateness vector table -- The read-only domain controllers -- Active Directory database maintenance -- The ntds.dit file -- The edb.log file -- The edb.chk file -- The temp.edb file -- Offline defragmentation -- Active Directory backup and recovery -- Preventing accidental deletion of objects -- Active Directory Recycle Bin -- Active Directory snapshots -- Active Directory system state backup -- Active Directory recovery from system state backup -- Summary -- Chapter 12: Active Directory Certificate Services -- PKI in action -- Symmetric keys versus asymmetric keys -- Digital encryption -- Digital signatures -- Signing, encryption, and decryption -- Secure Sockets Layer certificates -- Types of certification authorities -- How do certificates work with digital signatures and encryption? …”
    Full text (MFA users only)
    Electronic eBook
  16. 136
  17. 137

    Evaluation and management for infectious diseases and dermatologic disorders

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  18. 138

    Introduction to GIS programming and fundamentals with Python and ArcGIS by Yang, Chaowei

    Published 2017
    Table of Contents: “…Hands-On Experience: I/O, Create and Read a File --…”
    Full text (MFA users only)
    Electronic eBook
  19. 139

    The AI book : the artificial intelligence handbook for investors, entrepreneurs and FinTech visionaries

    Published 2020
    Table of Contents: “…AI Trust, Ethics, Transparency and Enablement. Invisible Hand, Spontaneous Order and Artificial Intelligence. …”
    Full text (MFA users only)
    Electronic eBook
  20. 140