Showing 121 - 149 results of 149 for search '((((hang OR (hans OR has)) OR hong) OR huang) OR (((((((chang OR ctang) OR chain) OR thant) OR (cwangs OR (chaing OR (changing OR cganging)))) OR (((((((cchangee OR cgangee) OR cchange) OR ccanse) OR ccange) OR (chaoss OR chaos)) OR ((twanges OR cgangeggs) OR (chonggs OR (twanges OR cgangeggs)))) OR (cwangs OR ccans))) OR (chong OR cang)) OR chan)) 'em high', query time: 0.86s Refine Results
  1. 121

    Oracle Database 12c Security Cookbook. by Pavlovic, Zoran

    Published 2016
    Full text (Emmanuel users only)
    Electronic eBook
  2. 122

    Lead-free Solders : Materials Reliability for Electronics. by Subramanian, K.

    Published 2012
    Full text (Emmanuel users only)
    Electronic eBook
  3. 123

    Basics of Analytical Chemistry and Chemical Equilibria by Tissue, Brian M.

    Published 2013
    Full text (Emmanuel users only)
    Electronic eBook
  4. 124
  5. 125

    Mastering Java Machine Learning. by Kamath, Dr. Uday

    Published 2017
    Table of Contents: “…Case Study -- Horse Colic Classification -- Business problem -- Machine learning mapping -- Data analysis -- Label analysis -- Features analysis -- Supervised learning experiments -- Weka experiments -- RapidMiner experiments -- Results, observations, and analysis -- Summary -- References -- Chapter 3: Unsupervised Machine Learning Techniques -- Issues in common with supervised learning -- Issues specific to unsupervised learning -- Feature analysis and dimensionality reduction -- Notation -- Linear methods -- Principal component analysis (PCA) -- Random projections (RP) -- Multidimensional Scaling (MDS) -- Nonlinear methods -- Kernel Principal Component Analysis (KPCA) -- Manifold learning -- Clustering -- Clustering algorithms -- k-Means -- DBSCAN -- Mean shift -- Expectation maximization (EM) or Gaussian mixture modeling (GMM) -- Hierarchical clustering -- Self-organizing maps (SOM) -- Spectral clustering -- Affinity propagation -- Clustering validation and evaluation -- Internal evaluation measures -- External evaluation measures -- Outlier or anomaly detection -- Outlier algorithms -- Statistical-based -- Distance-based methods -- Density-based methods -- Clustering-based methods -- High-dimensional-based methods -- One-class SVM -- Outlier evaluation techniques -- Supervised evaluation -- Unsupervised evaluation -- Real-world case study -- Tools and software -- Business problem -- Machine learning mapping -- Data collection -- Data quality analysis -- Data sampling and transformation -- Feature analysis and dimensionality reduction -- Observations on feature analysis and dimensionality reduction -- Clustering models, results, and evaluation -- Observations and clustering analysis -- Outlier models, results, and evaluation -- Summary -- References -- Chapter 4: Semi-Supervised and Active Learning -- Semi-supervised learning.…”
    Full text (Emmanuel users only)
    Electronic eBook
  6. 126

    The Crime Scene : a Visual Guide by Miller, Marilyn T., Massey, Peter

    Published 2015
    Full text (Emmanuel users only)
    Electronic eBook
  7. 127
  8. 128
  9. 129

    The papers of Henry Clay. by Clay, Henry, 1777-1852

    Published 1984
    Full text (Emmanuel users only)
    Electronic eBook
  10. 130
  11. 131
  12. 132

    Antenna-On-Chip Design, Challenges, and Opportunities. by Cheema, Hammad M.

    Published 2021
    Full text (Emmanuel users only)
    Electronic eBook
  13. 133
  14. 134

    Making a meal of it : writing about film by McFarlane, Brian, 1934-

    Published 2018
    Full text (Emmanuel users only)
    Electronic eBook
  15. 135
  16. 136
  17. 137

    Mastering Bootstrap 4. by Benjamin Jakobus; Jason Marah

    Published 2016
    Full text (Emmanuel users only)
    Electronic eBook
  18. 138

    Rearing animal and plant pathogen vectors

    Published 2014
    Full text (Emmanuel users only)
    Electronic eBook
  19. 139
  20. 140

    Too much is not enough! : Charleston Conference proceedings, 2013

    Published 2014
    Table of Contents: “…-published research / Alicia Wise, Amy Friedlander, Howard Ratner, Judy Ruttenberg and John Wilbanks - Plato's cave revisited / Bruce Heterick - The British national approach to scholarly communication / Lorraine Estelle - University presses and academic libraries demystified: a conversation / Leila Salisbury, Peter Berkery, Angela Carreño, Ellen Faran and Fred Heath - The long arm of the law / Ann Okerson, William Hannay, Bruce Strauch, Georgia Harper and Madelyn Wessel - Hyde Park corner debate: resolved: the current system of scholarly publishing, whereby publishers receive content for free and then sell it back to libraries at a high price, must fundamentally change / Elizabeth Chapman, Rick Anderson and Jean-Claude Guédon - I hear the train a comin' / Greg Tananbaum, William Gunn and Lorraine Haricombe -…”
    Full text
    Full text (Emmanuel users only)
    Electronic Conference Proceeding eBook
  21. 141

    Practical antenna design for wireless products by Lau, Henry

    Published 2019
    Full text (Emmanuel users only)
    Electronic eBook
  22. 142

    Technologies for RF systems by Edwards, T. C. (Terence Charles)

    Published 2018
    Full text (Emmanuel users only)
    Electronic eBook
  23. 143
  24. 144
  25. 145
  26. 146
  27. 147
  28. 148

    EMT Flashcard Book, 4th Ed. by Lindsey, Jeffrey

    Published 2018
    Full text (Emmanuel users only)
    Electronic eBook
  29. 149

    Public safety networks from LTE to 5G / Public safety networks from LTE to Five G by Yarali, Abdulrahman

    Published 2020
    Table of Contents: “…4.13 The Future of FirstNet: Connecting Networks Together 75 -- 4.14 High Capacity Information Delivery 76 -- 4.15 Qualities that Facilitate Efficient High Capacity Information Handling 77 -- 4.15.1 FirstNet Has a Trustworthy Security System 77 -- 4.15.2 Concentrated Network Performance 77 -- 4.15.3 Simple and Scalable 77 -- 4.15.4 High Level of Vulnerability Safeguards 77 -- 4.16 FirstNet User Equipment 77 -- 4.17 Core Network 78 -- 4.18 Illustration: Layers of the LTE Network 78 -- 4.18.1 Transport Backhaul 79 -- 4.18.2 The Radio Access Networks 79 -- 4.18.3 Public Safety Devices 79 -- References 80 -- 5 Higher Generation of Mobile Communications and Public Safety 81 -- 5.1 Introduction 81 -- 5.2 Review of Existing Public Safety Networks 81 -- 5.2.1 What are LMR Systems? …”
    Full text (Emmanuel users only)
    Electronic eBook