Search Results - (((((((ant OR semantic) OR mantis) OR hands) OR cantor) OR anne) OR file) OR wanting) algorithms.

  1. 141
  2. 142
  3. 143

    Learning predictive analytics with python : gain practical insights into predictive modelling by implementing Predictive Analytics algorithms on public datasets with Python by Kumar, Ashish

    Published 2016
    Table of Contents: “…Various methods of importing data in PythonCase 1 -- reading a dataset using the read_csv method; The read_csv method; Use cases of the read_csv method; Case 2 -- reading a dataset using the open method of Python; Reading a dataset line by line; Changing the delimiter of a dataset; Case 3 -- reading data from a URL; Case 4 -- miscellaneous cases; Reading from an .xls or .xlsx file; Writing to a CSV or Excel file; Basics -- summary, dimensions, structure; Handling missing values; Checking for missing values; What constitutes missing data?…”
    Full text (MFA users only)
    Electronic eBook
  4. 144
  5. 145
  6. 146
  7. 147
  8. 148
  9. 149
  10. 150

    Portable Moving Images : a Media History of Storage Formats by Cedeño Montaña, Ricardo

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  11. 151
  12. 152

    Mastering Active Directory by Francis, Dishan

    Published 2017
    Table of Contents: “…-- The update sequence number -- Directory Service Agent GUID and invocation ID -- The high watermark vector table -- The up-to-dateness vector table -- The read-only domain controllers -- Active Directory database maintenance -- The ntds.dit file -- The edb.log file -- The edb.chk file -- The temp.edb file -- Offline defragmentation -- Active Directory backup and recovery -- Preventing accidental deletion of objects -- Active Directory Recycle Bin -- Active Directory snapshots -- Active Directory system state backup -- Active Directory recovery from system state backup -- Summary -- Chapter 12: Active Directory Certificate Services -- PKI in action -- Symmetric keys versus asymmetric keys -- Digital encryption -- Digital signatures -- Signing, encryption, and decryption -- Secure Sockets Layer certificates -- Types of certification authorities -- How do certificates work with digital signatures and encryption? …”
    Full text (MFA users only)
    Electronic eBook
  13. 153
  14. 154

    Evaluation and management for infectious diseases and dermatologic disorders

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  15. 155

    Introduction to GIS programming and fundamentals with Python and ArcGIS by Yang, Chaowei

    Published 2017
    Table of Contents: “…Hands-On Experience: I/O, Create and Read a File --…”
    Full text (MFA users only)
    Electronic eBook
  16. 156

    The AI book : the artificial intelligence handbook for investors, entrepreneurs and FinTech visionaries

    Published 2020
    Table of Contents: “…AI Trust, Ethics, Transparency and Enablement. Invisible Hand, Spontaneous Order and Artificial Intelligence. …”
    Full text (MFA users only)
    Electronic eBook
  17. 157
  18. 158
  19. 159

    Tolerance graphs by Golumbic, Martin Charles

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  20. 160

    Pediatric Sensorineural Hearing Loss : Clinical Diagnosis and Management. by Anne, Samantha

    Published 2017
    Full text (MFA users only)
    Electronic eBook