Search Results - (((((((want OR canton) OR span) OR wanting) OR cantor) OR anne) OR carter) OR wansing) algorithms.

  1. 161

    Microbiological sensors for the drinking water industry

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  2. 162

    Creating E-Learning Games with Unity. by Horachek, David

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  3. 163

    Android Sensor Programming By Example. by Nagpal, Varun

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  4. 164

    Eat, cook, grow : mixing human-computer interactions with human-food interactions

    Published 2014
    Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
    Full text (MFA users only)
    Electronic eBook
  5. 165

    Deep learning with Python : a hands-on introduction by Ketkar, Nikhil

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  6. 166

    Deep learning for dummies by Mueller, John, 1958-, Massaron, Luca

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  7. 167

    Robust and error-free geometric computing by Eberly, Dave

    Published 2020
    Full text (MFA users only)
    Electronic eBook
  8. 168

    Handbook of industrial engineering equations, formulas, and calculations by Badiru, Adedeji Bodunde, 1952-

    Published 2011
    Table of Contents: “…Computational Foundations of Industrial Engineering ; Efficacy of Mathematical Modeling; Industrial Engineering and Computations; Definition and Applications; Orientation to STEM; IE Catchphrases; Span and Utility of IE; Heritage from Industrial Revolution; Historical Accounts; Chronology of Applications; Importance of Calculations Guide; Basic Queuing Equations; Queuing Birth-Death Processes; Laws of Motion of Queuing Birth and Death; Data Types for Computational Analysis; References; ; Basic Mathematical Calculations ; Quadratic Equation; Overall Mean; Chebyshev's Theorem; Permutations; Combinations; Probability Distribution; Probability; Distribution Function; Expected Value; Variance; Binomial Distribution; Poisson Distribution; Mean of a Binomial Distribution; Normal Distribution; Cumulative Distribution Function; Population Mean; Standard Error of the…”
    Full text (MFA users only)
    Electronic eBook
  9. 169

    Exploratory data analysis with MATLAB by Martinez, Wendy L., Martinez, Angel R., Solka, Jeffrey

    Published 2017
    Table of Contents: “…5.5.2 Probabilistic Latent Semantic Analysis5.6 Minimum Spanning Trees and Clustering; 5.6.1 Definitions; 5.6.2 Minimum Spanning Tree Clustering; 5.7 Evaluating the Clusters; 5.7.1 Rand Index; 5.7.2 Cophenetic Correlation; 5.7.3 Upper Tail Rule; 5.7.4 Silhouette Plot; 5.7.5 Gap Statistic; 5.7.6 Cluster Validity Indices; 5.8 Summary and Further Reading; Exercises; Chapter 6 Model-Based Clustering; 6.1 Overview of Model-Based Clustering; 6.2 Finite Mixtures; 6.2.1 Multivariate Finite Mixtures; 6.2.2 Component Models -- Constraining the Covariances; 6.3 Expectation-Maximization Algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  10. 170

    Mastering D3.js. by Castillo, Pablo Navarro

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  11. 171

    Learning OpenCV 3 Application Development. by Datta, Samyak

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  12. 172

    Finite-Dimensional Linear Algebra. by Gockenbach, Mark S.

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  13. 173
  14. 174

    Debates in the digital humanities 2016

    Published 2016
    Table of Contents: “…Father Busa Female Punch Card Operatives / Melissa Terras and Julianne Nyhan -- On the Origin of "Hack" and "Yack" / Bethany Nowviskie -- Reflections on a Movement: #transformDH, Growing Up / Moya Bailey, Anne Cong-Huyen, Alexis Lothian, and Amanda Phillips.…”
    Full text (MFA users only)
    Electronic eBook
  15. 175

    Trends in Functional Programming. by Nilsson, Henrik

    Published 2007
    Full text (MFA users only)
    Electronic eBook
  16. 176

    Deep Learning with TensorFlow : Explore neural networks and build intelligent systems with Python, 2nd Edition. by Zaccone, Giancarlo

    Published 2018
    Table of Contents: “…; Artificial neural networks; The biological neurons; The artificial neuron; How does an ANN learn?; ANNs and the backpropagation algorithm; Weight optimization; Stochastic gradient descent; Neural network architectures; Deep Neural Networks (DNNs); Multilayer perceptron; Deep Belief Networks (DBNs).…”
    Full text (MFA users only)
    Electronic eBook
  17. 177

    Dermatologic principles and practice in oncology : conditions of the skin, hair, and nails in cancer patients

    Published 2013
    Table of Contents: “…Borovicka, Jennifer R.S. Gordon, Ann Cameron Haley, Nicole E. Larson and Dennis P. …”
    Full text (MFA users only)
    Electronic eBook
  18. 178
  19. 179

    Discovering knowledge in data : an introduction to data mining by Larose, Daniel T.

    Published 2014
    Table of Contents: “…DISCOVERING KNOWLEDGE IN DATA -- Contents -- Preface -- 1 An Introduction to Data Mining -- 1.1 What is Data Mining? -- 1.2 Wanted: Data Miners -- 1.3 The Need for Human Direction of Data Mining -- 1.4 The Cross-Industry Standard Practice for Data Mining -- 1.4.1 Crisp-DM: The Six Phases -- 1.5 Fallacies of Data Mining -- 1.6 What Tasks Can Data Mining Accomplish? …”
    Full text (MFA users only)
    Electronic eBook
  20. 180

    IP multicast with applications to IPTV and mobile DVB-H by Minoli, Daniel, 1952-

    Published 2008
    Table of Contents: “…Cover -- TOC36;CONTENTS -- Preface -- About the Author -- CH36;1 INTRODUCTION TO IP MULTICAST -- 146;1 Introduction -- 146;2 Why Multicast Protocols are Wanted47;Needed -- 146;3 Basic Multicast Protocols and Concepts -- 146;4 IPTV and DVB45;H Applications -- 146;5 Course of Investigation -- Appendix 146;A58; Multicast IETF Request for Comments -- Appendix 146;B58; Multicast Bibliography -- References -- CH36;2 MULTICAST ADDRESSING FOR PAYLOAD -- 246;1 IP Multicast Addresses -- 246;146;1 Limited Scope Addresses -- 246;146;2 GLOP Addressing -- 246;146;3 Generic IPv4 Addressing -- 246;2 Layer 2 Multicast Addresses -- 246;246;1 Ethernet MAC Address Mapping -- 246;3 MPEG45;Layer Addresses -- References -- CH36;3 MULTICAST PAYLOAD FORWARDING -- 346;1 Multicasting on a LAN Segment -- 346;2 Multicasting between Network Segments -- 346;3 Multicast Distribution Trees -- 346;4 Multicast Forwarding58; Reverse Path Forwarding -- 346;5 Multicast Forwarding58; Center45;Based Tree Algorithm -- 346;6 Implementing IP Multicast in a Network -- References -- CH36;4 DYNAMIC HOST REGISTRATION8212;INTERNET GROUP MANAGEMENT PROTOCOL -- 446;1 IGMP Messages -- 446;2 IGMPv3 Messages -- 446;3 IGMP Operation -- Appendix 446;A58; Protocol Details for IGMPv2 -- 446;A46;1 Overview -- 446;A46;2 Protocol Description -- 446;A46;3 Receiver 40;Host41; State Diagram -- 446;A46;4 Router State Diagram -- Appendix 446;B58; IGMP Snooping Switches -- Appendix 446;C58; Example of Router Configurations -- References -- CH36;5 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; PROTOCOL INDEPENDENT MULTICAST -- 546;1 Introduction to PIM -- 546;2 PIM SM Details -- 546;246;1 Approach -- 546;246;2 PIM SM Protocol Overview -- 546;246;3 Detailed Protocol Description -- 546;246;4 Packet Formats -- References -- CH36;6 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; CORE45;BASED TREES -- 646;1 Motivation -- 646;2 Basic Operation -- 646;3 CBT Components and Functions -- 646;346;1 CBT Control Message Retransmission Strategy -- 646;346;2 Nonmember Sending -- 646;4 Core Router Discovery -- 646;5 Protocol Specification Details -- 646;546;1 CBT HELLO Protocol -- 646;546;2 JOIN_REQUEST Processing -- 646;546;3 JOIN_ACK Processing -- 646;546;4 QUIT_NOTIFICATION Processing -- 646;546;5 ECHO_REQUEST Processing -- 646;546;6 ECHO_REPLY Processing -- 646;546;7 FLUSH_TREE Processing -- 646;546;8 Nonmember Sending -- 646;546;9 Timers and Default Values -- 646;546;10 CBT Packet Formats and Message Types -- 646;546;11 Core Router Discovery -- 646;6 CBT Version 3 -- 646;646;1 The First Step58; Joining the Tree -- 646;646;2 Transient State -- 646;646;3 Getting 34;On Tree34; -- 646;646;4 Pruning and Prune State -- 646;646;5 The Forwarding Cache -- 646;646;6 Packet Forwarding -- 646;646;7 The 34;Keepalive34; Protocol -- 646;646;8 Control Message Precedence and Forwarding Criteria -- 646;646;9 Broadcast LANs -- 646;646;10 The 34;all45;cbt45;routers34; Group -- 646;646;11 Nonmember Sending -- References -- CH36;7 MULTICAST ROUTING8212;DENSE45;MODE PROTOCOLS58; PIM DM.…”
    Full text (MFA users only)
    Electronic eBook