Search Results - (((((((ant OR mantis) OR santis) OR hands) OR cantor) OR anne) OR file) OR ranting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 93
- Mathematical models 71
- Mathematics 63
- Artificial intelligence 49
- Machine learning 49
- Algorithms 47
- algorithms 40
- artificial intelligence 36
- methods 35
- Data mining 33
- Mathematical optimization 29
- Computer networks 26
- Python (Computer program language) 25
- Artificial Intelligence 24
- Signal processing 24
- Development 22
- Digital techniques 22
- Computer algorithms 21
- Application software 20
- Data Mining 20
- Image processing 19
- Computer simulation 17
- Diseases 17
- Technological innovations 17
- Computer science 16
- Computer security 16
- Research 15
- Statistical methods 15
- Computational Biology 14
- Finance 14
Search alternatives:
- ant »
- mantis »
- santis »
- cantor »
- ranting »
-
121
Mental ray for Maya, 3ds max, and XSI : a 3D artist's guide to rendering
Published 2008Full text (MFA users only)
Electronic eBook -
122
Turing's vision : the birth of computer science
Published 2016Full text (MFA users only)
Electronic eBook -
123
Mathematica data visualization : create and prototype interactive data visualizations using Mathematica
Published 2014Full text (MFA users only)
Electronic eBook -
124
Kienböck's disease : advances in diagnosis and treatment
Published 2016Full text (MFA users only)
Electronic eBook -
125
Machine Learning and Big Data Concepts, Algorithms, Tools and Applications
Published 2020Full text (MFA users only)
Electronic eBook -
126
Intelligence emerging : adaptivity and search in evolving neural systems
Published 2015Full text (MFA users only)
Electronic eBook -
127
Heuristics in analytics : a practical perspective of what influences our analytical world
Published 2014Full text (MFA users only)
Electronic eBook -
128
Learning predictive analytics with python : gain practical insights into predictive modelling by implementing Predictive Analytics algorithms on public datasets with Python
Published 2016Table of Contents: “…Various methods of importing data in PythonCase 1 -- reading a dataset using the read_csv method; The read_csv method; Use cases of the read_csv method; Case 2 -- reading a dataset using the open method of Python; Reading a dataset line by line; Changing the delimiter of a dataset; Case 3 -- reading data from a URL; Case 4 -- miscellaneous cases; Reading from an .xls or .xlsx file; Writing to a CSV or Excel file; Basics -- summary, dimensions, structure; Handling missing values; Checking for missing values; What constitutes missing data?…”
Full text (MFA users only)
Electronic eBook -
129
Robust range image registration : using genetic algorithms and the surface interpenetration measure
Published 2005Full text (MFA users only)
Electronic eBook -
130
Adaptive tests of significance using permutations of residuals with R and SAS
Published 2012Full text (MFA users only)
Electronic eBook -
131
ReCombinatorics : the algorithmics of ancestral recombination graphs and explicit phylogenetic networks
Published 2014Full text (MFA users only)
Electronic eBook -
132
High-frequency trading : a practical guide to algorithmic strategies and trading systems
Published 2010Full text (MFA users only)
Electronic eBook -
133
Portable Moving Images : a Media History of Storage Formats
Published 2017Full text (MFA users only)
Electronic eBook -
134
Machine Learning and Big Data with KDB+/Q : Q, High Frequency Financial Data and Algorithmic Trading.
Published 2019Full text (MFA users only)
Electronic eBook -
135
Mastering Active Directory
Published 2017Table of Contents: “…-- The update sequence number -- Directory Service Agent GUID and invocation ID -- The high watermark vector table -- The up-to-dateness vector table -- The read-only domain controllers -- Active Directory database maintenance -- The ntds.dit file -- The edb.log file -- The edb.chk file -- The temp.edb file -- Offline defragmentation -- Active Directory backup and recovery -- Preventing accidental deletion of objects -- Active Directory Recycle Bin -- Active Directory snapshots -- Active Directory system state backup -- Active Directory recovery from system state backup -- Summary -- Chapter 12: Active Directory Certificate Services -- PKI in action -- Symmetric keys versus asymmetric keys -- Digital encryption -- Digital signatures -- Signing, encryption, and decryption -- Secure Sockets Layer certificates -- Types of certification authorities -- How do certificates work with digital signatures and encryption? …”
Full text (MFA users only)
Electronic eBook -
136
-
137
Evaluation and management for infectious diseases and dermatologic disorders
Published 2017Full text (MFA users only)
Electronic eBook -
138
Introduction to GIS programming and fundamentals with Python and ArcGIS
Published 2017Table of Contents: “…Hands-On Experience: I/O, Create and Read a File --…”
Full text (MFA users only)
Electronic eBook -
139
The AI book : the artificial intelligence handbook for investors, entrepreneurs and FinTech visionaries
Published 2020Table of Contents: “…AI Trust, Ethics, Transparency and Enablement. Invisible Hand, Spontaneous Order and Artificial Intelligence. …”
Full text (MFA users only)
Electronic eBook -
140
Data Mining for Business Analytics : Concepts, Techniques, and Applications with XLMiner.
Published 2016Full text (MFA users only)
Electronic eBook