Search Results - (((((((ant OR santis) OR wantis) OR hands) OR cantor) OR anne) OR file) OR wsanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 93
- Mathematical models 71
- Mathematics 63
- Artificial intelligence 49
- Machine learning 49
- Algorithms 47
- algorithms 40
- artificial intelligence 36
- methods 35
- Data mining 33
- Mathematical optimization 29
- Computer networks 26
- Python (Computer program language) 25
- Artificial Intelligence 24
- Signal processing 24
- Development 22
- Digital techniques 22
- Computer algorithms 21
- Application software 20
- Data Mining 20
- Image processing 19
- Computer simulation 17
- Diseases 17
- Technological innovations 17
- Computer science 16
- Computer security 16
- Research 15
- Statistical methods 15
- Computational Biology 14
- Finance 14
Search alternatives:
- ant »
- santis »
- wantis »
- cantor »
- wsanting »
-
101
Visual computing for medicine : theory, algorithms, and applications
Published 2014Full text (MFA users only)
Electronic eBook -
102
Hands-On Data Warehousing with Azure Data Factory : ETL techniques to load and transform data from various sources, both on-premises and on cloud.
Published 2018Table of Contents: “…Ways to directly copy files into the Data LakePrerequisites for the next steps; Creating a Data Lake Analytics resource; Using the data factory to manipulate data in the Data Lake; Task 1 -- copy/import data from SQL Server to a blob storage file using data factory; Task 2 -- run a U-SQL task from the data factory pipeline to summarize data; Service principal authentication; Run U-SQL from a job in the Data Lake Analytics; Summary; Chapter 5: Machine Learning on the Cloud; Machine learning overview; Machine learning algorithms; Supervised learning; Unsupervised learning; Reinforcement learning.…”
Full text (MFA users only)
Electronic eBook -
103
-
104
New directions in statistical signal processing : from systems to brain
Published 2007Full text (MFA users only)
Electronic eBook -
105
Oracle Blockchain Quick Start Guide : a Practical Approach to Implementing Blockchain in Your Enterprise.
Published 2019Full text (MFA users only)
Electronic eBook -
106
Computational technologies. Advanced topics
Published 2015Full text (MFA users only)
Electronic eBook -
107
Discrete Algebraic Methods : Arithmetic, Cryptography, Automata and Groups
Published 2016Full text (MFA users only)
Electronic eBook -
108
Oracle 10g/11g data and database management utilities : master twelve must-use utilities to optimize the efficiency, management, and performance of your daily database task
Published 2009Table of Contents: “…Cover; Table of Contents; Preface; Chapter 1: Data Pump; Data Pump features; Data Pump architecture; Setting up the practical scenarios; Data Pump export; Data Pump export modes; A simple Data Pump export session; Data Pump export filtering operations; Use of parameter file; Retrieve original data; Data Pump export space estimation; Dump file multiplexing; Transporting data among different versions; Data Pump export interactive mode; Data Pump restart capability; Getting information about the export job; Data Pump import; Remap function; Data Pump import network mode…”
Full text (MFA users only)
Electronic eBook -
109
Online stochastic combinatorial optimization
Published 2006Full text (MFA users only)
Electronic eBook -
110
Stochastic processes in polymeric fluids : tools and examples for developing simulation algorithms
Published 1996Full text (MFA users only)
Electronic eBook -
111
A guide to creating a successful algorithmic trading strategy
Published 2016Full text (MFA users only)
Electronic eBook -
112
-
113
Reading machines : toward an algorithmic criticism
Published 2011Full text (MFA users only)
Electronic eBook -
114
ModSecurity 2.5.
Published 2009Table of Contents: “…Blocking uncommon request methodsRestricting access to certain times of day; Detecting credit card leaks; Detecting credit card numbers; The Luhn algorithm and false positives; Tracking the geographical location of your visitors; GEO collection fields; Blocking users from specific countries; Load balancing requests between servers on different continents; Pausing requests for a specified amount of time; Executing shell scripts; Sending alert emails; Sending more detailed alert emails; Counting file downloads; Blocking brute-force password guessing; Injecting data into responses.…”
Full text (MFA users only)
Electronic eBook -
115
Penetration testing : a hands-on introduction to hacking
Published 2014Table of Contents: “…NTLM Hashing Algorithms / Peter Van Eeckhoutte -- The Trouble with LM Password Hashes / Peter Van Eeckhoutte -- John the Ripper / Peter Van Eeckhoutte -- Cracking Linux Passwords / Peter Van Eeckhoutte -- Cracking Configuration File Passwords / Peter Van Eeckhoutte -- Rainbow Tables / Peter Van Eeckhoutte -- Online Password-Cracking Services / Peter Van Eeckhoutte -- Dumping Plaintext Passwords from Memory with Windows Credential Editor / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 10. …”
Full text (MFA users only)
Electronic eBook -
116
JPEG2000 standard for image compression : concepts, algorithms and VLSI architectures
Published 2005Table of Contents: “…Preface; 1 Introduction to Data Compression; 2 Source Coding Algorithms; 3 JPEG: Still Image Compression Standard; 4 Introduction to Discrete Wavelet Transform; 5 VLSI Architectures for Discrete Wavelet Transforms; 6 JPEG2000 Standard; 7 Coding Algorithms in JPEG2000; 8 Code-Stream Organization and File Format; 9 VLSI Architectures for JPEG2000; 10 Beyond Part 1 of JPEG2000 Standard; Index; About the Authors.…”
Full text (MFA users only)
Electronic eBook -
117
-
118
-
119
Mastering machine learning with R : advanced prediction, algorithms, and learning methods with R 3.x
Published 2017Full text (MFA users only)
Electronic eBook -
120
Adventures in Raspberry Pi
Published 2017Table of Contents: “…-- Setting Up the Raspberry Pi -- Downloading and Copying the Raspbian Operating System -- Plugging in the Hardware -- Installing and Configuring the Software -- Exploring the Desktop in Raspbian -- Shutting Down Your Raspberry Pi -- Connecting to a Wi-Fi Network -- Backing Up an SD Card Image -- Adventure 2 Taking Command of Your Raspberry Pi -- Exploring the Terminal -- Commands for Navigating Through Your File System -- Understanding sudo -- Launching Programs from the Command Line -- Managing Files and Directories -- Installing and Updating Applications -- Downloading and Installing Applications -- Learning More About an Application -- Upgrading Your Apps -- Editing Files -- Using Shutdown and Restart Commands -- Continuing Your Text Adventure -- Adventure 3 Creating Stories and Games with Scratch -- Getting Started with Scratch -- The Scratch Interface -- A Quick Hello from Scratch Cat -- Setting the Stage -- Creating Costumes and Original Sprites -- Using the Scratch Sprite Image Library -- Editing an Existing Sprite -- Creating Your Own Original Sprites -- Animating a Crazy Monkey -- Creating an Adventure Role-Playing Game -- Creating Your Sprite and Stage -- Setting the Start Position of the Adventurer Sprite -- Creating Variables: Including Health Points for the Adventurer Sprite -- Controlling the Direction and Movement of the Adventurer Sprite -- Entering a Cave and Switching Backgrounds.…”
Full text (MFA users only)
Electronic eBook