Search Results - (((((((ant OR wwanti) OR mkantis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 481

    Adventures in Authentic Learning : 21 Step-by-Step Projects From an Edtech Coach. by Harrington, Kristin

    Published 2020
    Table of Contents: “…Lesson Plans -- Lesson Plan 2.1 PechaKucha Presentations -- Lesson Plan 2.2 Life Cycles Jigsaw Research Project -- Lesson Plan 2.3 Math Jigsaw Project -- Lesson Plan 2.4 Student-Created Tutorial Videos -- Coach's Connection -- CHAPTER 3: Collaborate for Success -- Some Lesser-Known Educator Sharing Tools -- Enhance Projects with Content Experts -- Provide an Authentic Audience -- Engaging Students in Peer Review -- Lesson Plans -- Lesson Plan 3.1 Algorithmic Thinking Project -- Lesson Plan 3.2 Pick Your Path Stories -- Lesson Plan 3.3 Invent It Challenge…”
    Full text (MFA users only)
    Electronic eBook
  2. 482

    System and Bayesian reliability : essays in honor of Professor Richard E. Barlow on his 70th birthday

    Published 2001
    Table of Contents: “…Using the Conditional Expectation Inequality to Bound the Reliability Function; 3. Bounds When Component States Are Dependent; 4. Summary; Acknowledgements; References.…”
    Full text (MFA users only)
    Electronic eBook
  3. 483

    Ecological modelling and ecophysics : agricultural and environmental applications by Fort, Hugo

    Published 2024
    Table of Contents: “…Markovian simulation algorithms inspired in statistical physics -- 5.6. Monte Carlo algorithms as an optimization tool : simulated annealing -- 5.7. …”
    Full text (MFA users only)
    Electronic eBook
  4. 484

    Pediatric incontinence : evaluation and clinical management

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  5. 485

    Knowledge mining using intelligent agents

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  6. 486

    Nonlinear parameter optimization using R tools by Nash, John C., 1947-

    Published 2014
    Table of Contents: “…Chapter 3 Software structure and interfaces3.1 Perspective; 3.2 Issues of choice; 3.3 Software issues; 3.4 Specifying the objective and constraints to the optimizer; 3.5 Communicating exogenous data to problem definition functions; 3.5.1 Use of ""global'' data and variables; 3.6 Masked (temporarily fixed) optimization parameters; 3.7 Dealing with inadmissible results; 3.8 Providing derivatives for functions; 3.9 Derivative approximations when there are constraints; 3.10 Scaling of parameters and function; 3.11 Normal ending of computations; 3.12 Termination tests-abnormal ending.…”
    Full text (MFA users only)
    Electronic eBook
  7. 487

    Trading on sentiment : the power of minds over markets by Peterson, Richard L., 1972-

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  8. 488

    Computer and network security essentials

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  9. 489
  10. 490

    Corporate strategy for dramatic productivity surge

    Published 2013
    Table of Contents: “…Instantaneous and spontaneous information sharing / Hiromichi Yasuoka -- ch. 7. The development of a three-minute battery charger / Toru Fujii -- ch. 8. …”
    Full text (MFA users only)
    Electronic eBook
  11. 491

    Accelerating MATLAB with GPU computing : a primer with examples by Suh, Jung W., Kim, Youngmin

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  12. 492
  13. 493

    XML for DB2 information integration

    Published 2004
    Table of Contents: “…Shredding XML into relational tables -- 6.1 Shredding overview -- 6.1.1 What is shredding? -- 6.1.2 When should you use shredding? -- 6.2 Shredding using DB2 XML Extender -- 6.2.1 Shredding -- planning and design -- 6.2.2 Planning and design: hints and tips -- 6.2.3 Shredding: configuration and execution -- 6.3 Alternatives to shredding with DB2 XML Extender -- 6.3.1 Using the XML wrapper -- 6.3.2 Writing your own code -- 6.4 Shredding with XML Extender: a step-by-step example -- 6.4.1 Step 1 -- XML enabling of your database -- 6.4.2 Step 2 -- Creating the DAD file -- 6.4.3 Step 3 -- Enablement of the XML collection -- 6.4.4 Step 4 -- Decomposing the XML data into relational tables -- 6.4.5 Step 5 -- Checking the result using the SELECT statement -- Chapter 7. …”
    Full text (MFA users only)
    Electronic eBook
  14. 494

    Digitalization of Society and Socio-Political Issues. 1, Digital, Communication, and Culture

    Published 2019
    Table of Contents: “…The Digitalization of Cultural Policies in France 149; Anne BELLON 14.1.…”
    Full text (MFA users only)
    Electronic eBook
  15. 495

    Building Machine Learning Systems with Python : Explore Machine Learning and Deep Learning Techniques for Building Intelligent Systems Using Scikit-Learn and TensorFlow, 3rd Editio... by Pedro Coelho, Luis

    Published 2018
    Table of Contents: “…Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Getting Started with Python Machine Learning; Machine learning and Python -- a dream team; What the book will teach you -- and what it will not; How to best read this book; What to do when you are stuck; Getting started; Introduction to NumPy, SciPy, Matplotlib, and TensorFlow; Installing Python; Chewing data efficiently with NumPy and intelligently with SciPy; Learning NumPy; Indexing; Handling nonexistent values; Comparing the runtime; Learning SciPy; Fundamentals of machine learning.…”
    Full text (MFA users only)
    Electronic eBook
  16. 496

    Tumor board review : guideline and case reviews in oncology

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  17. 497

    ModSecurity 2.5. by Mischel, Magnus

    Published 2009
    Table of Contents: “…Filtering collection fields using a regular expressionBuilt-in fields; Transformation functions; Other operators; Set-based pattern matching with @pm and @pmFromFile; @pmFromFile; Performance of the phrase matching operators; Validating character ranges; Phases and rule ordering; Actions-what to do when a rule matches; Allowing requests; Blocking requests; Taking no action but continuing rule processing; Dropping requests; Redirecting and proxying requests; SecAction; Using the ctl action to control the rule engine; How to use the ctl action; Macro expansion; SecRule in practice.…”
    Full text (MFA users only)
    Electronic eBook
  18. 498

    Personality Revolution : Using AI to Understand Your Customers and Win More Business. by D'Agostino, Andrew

    Published 2019
    Table of Contents: “…Cover; Title Page; Copyright Page; Contents; Introduction; Doubting the Usefulness of Personality Models; Joining the Personality Revolution; PART I The Truth About Personality: Making sense of human behavior in an unpredictable world; Chapter 1 The High Cost of Not Understanding People; Flying Blind in a Complicated World; Seeing Others Through the Lens of Personality; What Happens When Personalities Clash; How Crystal Got Started; Chapter 2 The Ingredients of a Unique Personality; Where Do Personality Differences Come From?…”
    Full text (MFA users only)
    Electronic eBook
  19. 499

    Concise encyclopaedia of bioinformatics and computational biology 2e

    Published 2014
    Table of Contents: “….; Akaike Information Criterion; Pedro Larranaga and Concha Bielza; Algorithm; Matthew He; Alignment (Domain Alignment, Repeats Alignment); Jaap Heringa; Alignment Score; Laszlo Patthy; Allele-Sharing Methods (Non-parametric Linkage Analysis).…”
    Full text (MFA users only)
    Electronic eBook
  20. 500

    Digitalization of society and socio-political issues. 2, Digital, information, and research

    Published 2020
    Table of Contents: “…6. When Vlogging Educates in Politics: The French Case of "Osons Causer" -- 6.1. …”
    Full text (MFA users only)
    Electronic eBook