Suggested Topics within your search.
Suggested Topics within your search.
- Group identity 23
- Social life and customs 22
- History 11
- Criticism and interpretation 7
- Cooking, Colombian 6
- Food habits 6
- Management 6
- History and criticism 5
- Antennas (Electronics) 3
- Learning 3
- Politics and government 3
- Research 3
- Social conditions 3
- Web site development 3
- Analytical chemistry 2
- Architectural design 2
- Architecture, Domestic 2
- Automobiles 2
- Buses 2
- Cover letters 2
- Disaster medicine 2
- Economic conditions 2
- Emergency Medical Services 2
- Emergency medical services 2
- Employee participation 2
- Environmental aspects 2
- Football coaches 2
- Hazardous waste site remediation 2
- Job hunting 2
- Mathematical models 2
Search alternatives:
hang » hans (Expand Search), wang (Expand Search), gang (Expand Search)
chang » chans (Expand Search), cwang (Expand Search), cgang (Expand Search), change (Expand Search), chaing (Expand Search), cang (Expand Search), thang (Expand Search)
changs » chanss (Expand Search), cwangs (Expand Search), cgangs (Expand Search), changes (Expand Search), change (Expand Search), chaings (Expand Search), cangs (Expand Search), thangs (Expand Search)
changees » chansees (Expand Search), cwangees (Expand Search), cgangees (Expand Search), changeees (Expand Search), changes (Expand Search), change (Expand Search), changed (Expand Search), chaingees (Expand Search), cangees (Expand Search), thangees (Expand Search)
cass » cases (Expand Search), case (Expand Search), mass (Expand Search)
chass » chaos (Expand Search)
chess » hess (Expand Search)
chainges » changes (Expand Search), change (Expand Search), changed (Expand Search)
clong » long (Expand Search), along (Expand Search)
chong » clong (Expand Search), csong (Expand Search)
hong » long (Expand Search), song (Expand Search)
chanss » chainss (Expand Search), canss (Expand Search), thanss (Expand Search)
chan » chain (Expand Search), can (Expand Search), than (Expand Search)
hang » hans (Expand Search), wang (Expand Search), gang (Expand Search)
chang » chans (Expand Search), cwang (Expand Search), cgang (Expand Search), change (Expand Search), chaing (Expand Search), cang (Expand Search), thang (Expand Search)
changs » chanss (Expand Search), cwangs (Expand Search), cgangs (Expand Search), changes (Expand Search), change (Expand Search), chaings (Expand Search), cangs (Expand Search), thangs (Expand Search)
changees » chansees (Expand Search), cwangees (Expand Search), cgangees (Expand Search), changeees (Expand Search), changes (Expand Search), change (Expand Search), changed (Expand Search), chaingees (Expand Search), cangees (Expand Search), thangees (Expand Search)
cass » cases (Expand Search), case (Expand Search), mass (Expand Search)
chass » chaos (Expand Search)
chess » hess (Expand Search)
chainges » changes (Expand Search), change (Expand Search), changed (Expand Search)
clong » long (Expand Search), along (Expand Search)
chong » clong (Expand Search), csong (Expand Search)
hong » long (Expand Search), song (Expand Search)
chanss » chainss (Expand Search), canss (Expand Search), thanss (Expand Search)
chan » chain (Expand Search), can (Expand Search), than (Expand Search)
-
121
The hero factor : how great leaders transform organizations and create winning cultures
Published 2018Full text (Emmanuel users only)
Electronic eBook -
122
Forensic photography : a practitioner's guide
Published 2014Table of Contents: “…Title Page; Copyright; Foreword; Preface; Acknowledgements; About the Companion Website; Chapter 1: Image Processing; 1.1 Introduction; 1.2 The digital image; 1.3 Image acquisition; 1.4 Colour images; 1.5 The imaging chain and workflow; 1.6 White balance; 1.7 Image histogram; 1.8 Image processing terminology; 1.9 Digital image processing operations; 1.10 Classes of operations; 1.11 Noise reduction; 1.12 Sharpening filters; 1.13 History log; 1.14 Layers; 1.15 Bit depth and dynamic range; 1.16 File formats; 1.17 Image compression; 1.18 Image processing at image capture.…”
Full text (Emmanuel users only)
Electronic eBook -
123
-
124
Sustainable development in chemical engineering : innovative technologies
Published 2013Full text (Emmanuel users only)
Electronic eBook -
125
Carbon Nanotubes and Nanosensors : Vibration, Buckling and Balistic Impact.
Published 2013Full text (Emmanuel users only)
Electronic eBook -
126
-
127
Koenig and Schultz's disaster medicine : comprehensive principles and practices / Disaster medicine :
Published 2010Full text (Emmanuel users only)
Electronic eBook -
128
Antenna-On-Chip Design, Challenges, and Opportunities.
Published 2021Full text (Emmanuel users only)
Electronic eBook -
129
Cossacks in Jamaica, Ukraine at the antipodes : essays in honor of Marko Pavlyshyn
Published 2020Full text (Emmanuel users only)
Electronic eBook -
130
Making a meal of it : writing about film
Published 2018Full text (Emmanuel users only)
Electronic eBook -
131
Oracle Database 12c Security Cookbook.
Published 2016Full text (Emmanuel users only)
Electronic eBook -
132
Engineering autonomous vehicles and robots : the DragonFly modular-based approach
Published 2020Full text (Emmanuel users only)
Electronic eBook -
133
Renewable Energy and Power Technology II : Selected, Peer Reviewed Papers from the 2014 2nd International Conference on Renewable Energy and Environmental Technology (REET 2014), A...
Published 2014Full text (Emmanuel users only)
Electronic Conference Proceeding eBook -
134
Mastering Java Machine Learning.
Published 2017Table of Contents: “…Case Study -- Horse Colic Classification -- Business problem -- Machine learning mapping -- Data analysis -- Label analysis -- Features analysis -- Supervised learning experiments -- Weka experiments -- RapidMiner experiments -- Results, observations, and analysis -- Summary -- References -- Chapter 3: Unsupervised Machine Learning Techniques -- Issues in common with supervised learning -- Issues specific to unsupervised learning -- Feature analysis and dimensionality reduction -- Notation -- Linear methods -- Principal component analysis (PCA) -- Random projections (RP) -- Multidimensional Scaling (MDS) -- Nonlinear methods -- Kernel Principal Component Analysis (KPCA) -- Manifold learning -- Clustering -- Clustering algorithms -- k-Means -- DBSCAN -- Mean shift -- Expectation maximization (EM) or Gaussian mixture modeling (GMM) -- Hierarchical clustering -- Self-organizing maps (SOM) -- Spectral clustering -- Affinity propagation -- Clustering validation and evaluation -- Internal evaluation measures -- External evaluation measures -- Outlier or anomaly detection -- Outlier algorithms -- Statistical-based -- Distance-based methods -- Density-based methods -- Clustering-based methods -- High-dimensional-based methods -- One-class SVM -- Outlier evaluation techniques -- Supervised evaluation -- Unsupervised evaluation -- Real-world case study -- Tools and software -- Business problem -- Machine learning mapping -- Data collection -- Data quality analysis -- Data sampling and transformation -- Feature analysis and dimensionality reduction -- Observations on feature analysis and dimensionality reduction -- Clustering models, results, and evaluation -- Observations and clustering analysis -- Outlier models, results, and evaluation -- Summary -- References -- Chapter 4: Semi-Supervised and Active Learning -- Semi-supervised learning.…”
Full text (Emmanuel users only)
Electronic eBook -
135
Rearing animal and plant pathogen vectors
Published 2014Full text (Emmanuel users only)
Electronic eBook -
136
Responsive Web Design with HTML5 and CSS3 Essentials.
Published 2016Full text (Emmanuel users only)
Electronic eBook -
137
Radio-frequency integrated-circuit engineering
Published 2015Full text (Emmanuel users only)
Electronic eBook -
138
Practical antenna design for wireless products
Published 2019Full text (Emmanuel users only)
Electronic eBook -
139
-
140
FUNdraising : 50 Proven Strategies for Successful School Fundraisers.
Published 2007Full text (Emmanuel users only)
Electronic eBook -
141
-
142
EW 104 : EW against a new generation of threats / EW against a new generation of threats
Published 2015Full text (Emmanuel users only)
Electronic eBook -
143
Too much is not enough! : Charleston Conference proceedings, 2013
Published 2014Table of Contents: “…-published research / Alicia Wise, Amy Friedlander, Howard Ratner, Judy Ruttenberg and John Wilbanks - Plato's cave revisited / Bruce Heterick - The British national approach to scholarly communication / Lorraine Estelle - University presses and academic libraries demystified: a conversation / Leila Salisbury, Peter Berkery, Angela Carreño, Ellen Faran and Fred Heath - The long arm of the law / Ann Okerson, William Hannay, Bruce Strauch, Georgia Harper and Madelyn Wessel - Hyde Park corner debate: resolved: the current system of scholarly publishing, whereby publishers receive content for free and then sell it back to libraries at a high price, must fundamentally change / Elizabeth Chapman, Rick Anderson and Jean-Claude Guédon - I hear the train a comin' / Greg Tananbaum, William Gunn and Lorraine Haricombe -…”
Full text
Full text (Emmanuel users only)
Electronic Conference Proceeding eBook -
144
Particle Physics on the Eve of LHC : Proceedings of the Thirteenth Lomonosov Conference on Elementary Particle Physics, Moscow Russia, 23-29 August 2007
Published 2009Full text (Emmanuel users only)
Electronic Conference Proceeding eBook -
145
Resuscitate! : how your community can improve survival from sudden cardiac arrest
Published 2013Full text (Emmanuel users only)
Electronic eBook -
146
-
147
Public safety networks from LTE to 5G / Public safety networks from LTE to Five G
Published 2020Table of Contents: “…4.13 The Future of FirstNet: Connecting Networks Together 75 -- 4.14 High Capacity Information Delivery 76 -- 4.15 Qualities that Facilitate Efficient High Capacity Information Handling 77 -- 4.15.1 FirstNet Has a Trustworthy Security System 77 -- 4.15.2 Concentrated Network Performance 77 -- 4.15.3 Simple and Scalable 77 -- 4.15.4 High Level of Vulnerability Safeguards 77 -- 4.16 FirstNet User Equipment 77 -- 4.17 Core Network 78 -- 4.18 Illustration: Layers of the LTE Network 78 -- 4.18.1 Transport Backhaul 79 -- 4.18.2 The Radio Access Networks 79 -- 4.18.3 Public Safety Devices 79 -- References 80 -- 5 Higher Generation of Mobile Communications and Public Safety 81 -- 5.1 Introduction 81 -- 5.2 Review of Existing Public Safety Networks 81 -- 5.2.1 What are LMR Systems? …”
Full text (Emmanuel users only)
Electronic eBook