Search alternatives:
"klight" » "slight" (Expand Search)
"sight" » "might" (Expand Search)
"frightss" » "rights" (Expand Search), "frightsss" (Expand Search)
"frightsssly" » "rightssly" (Expand Search), "frightsly" (Expand Search), "frightssssly" (Expand Search)
"rightsss" » "rights" (Expand Search), "rightssss" (Expand Search)
"nights" » "rights" (Expand Search), "lights" (Expand Search), "insights" (Expand Search)
"fight" » "might" (Expand Search)
"fights" » "mights" (Expand Search), "rights" (Expand Search), "lights" (Expand Search)
"fightssly" » "mightssly" (Expand Search), "rightssly" (Expand Search), "lightssly" (Expand Search)
"weight" » "wright" (Expand Search)
"rightsly" » "rights" (Expand Search), "rightssly" (Expand Search)
"right" » "rights" (Expand Search)
"klight" » "slight" (Expand Search)
"sight" » "might" (Expand Search)
"frightss" » "rights" (Expand Search), "frightsss" (Expand Search)
"frightsssly" » "rightssly" (Expand Search), "frightsly" (Expand Search), "frightssssly" (Expand Search)
"rightsss" » "rights" (Expand Search), "rightssss" (Expand Search)
"nights" » "rights" (Expand Search), "lights" (Expand Search), "insights" (Expand Search)
"fight" » "might" (Expand Search)
"fights" » "mights" (Expand Search), "rights" (Expand Search), "lights" (Expand Search)
"fightssly" » "mightssly" (Expand Search), "rightssly" (Expand Search), "lightssly" (Expand Search)
"weight" » "wright" (Expand Search)
"rightsly" » "rights" (Expand Search), "rightssly" (Expand Search)
"right" » "rights" (Expand Search)
-
143921
Mrs. McDockerty's knitting
Boston : Houghton Mifflin, 1990Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
143922
Dominic
New York : Farrar, Straus, Giroux, 1972
First edition.Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
143923
The Mitchells
New York : Viking Press, 1945Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
143924
Whiskey tango foxtrot
New York : Mulholland Books, 2014
First edition.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
143925
The cricket warrior : a chinese tale
New York : Toronto : Margaret K. McElderry Books ; Maxwell Macmillan Canada, 1994
First edition.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
143926
Linux® Patch Management Keeping Linux® Systems Up To Date
Prentice Hall, 2006
1st edition.Format: Electronic eBookFull text (Wentworth users only)
-
143927
Applications of machine learning in big-data analytics and cloud computing
Gistrup : River Publishers, 2021Table of Contents: “…Preface xv List of Contributors xxi List of Figures xxv List of Tables xxix List of Abbreviations xxxi 1 Pattern Analysis of COVID-19 Death and Recovery Cases Data of Countries Using Greedy Biclustering Algorithm 1 1.1 Introduction 2 1.2 Problem Description 3 1.2.1 Greedy Approach: Bicluster Size Maximization Based Fitness Function 4 1.2.2 Data Description 5 1.3 Proposed Work: COVID 19 Pattern Identification Using Greedy Biclustering 7 1.4 Results and Discussions 8 1.5 Conclusion 18 1.6 Acknowledgements 18 References 18 2 Artificial Fish Swarm Optimization Algorithm with Hill Climbing Based Clustering Technique for Throughput Maximization in Wireless Multimedia Sensor Network 23 2.1 Introduction 24 2.2 The Proposed AFSA-HC Technique 27 2.2.1 AFSA-HC Based Clustering Phase 28 2.2.2 Deflate-Based Data Aggregation Phase 33 2.2.3 Hybrid Data Transmission Phase 34 2.3 Performance Validation 34 2.4 Conclusion 40 References 40 3 Analysis of Machine Learning Techniques for Spam Detection 43 3.1 Introduction 44 3.1.1 Ham Messages 44 3.1.2 Spam Messages 44 3.2 Types of Spam Attack 45 3.2.1 Email Phishing 45 3.2.2 Spear Phishing 45 3.2.3 Whaling 46 3.3 Spammer Methods 46 3.4 Some Prevention Methods From User End 46 3.4.1 Protect Email Addresses 46 3.4.2 Preventing Spam from Being Sent 47 3.4.3 Block Spam to be Delivered 48 3.4.4 Identify and Separate Spam After Delivery 48 3.4.4.1 Targeted Link Analysis 48 3.4.4.2 Bayesian Filters 48 3.4.5 Report Spam 48 3.5 Machine Learning Algorithms 48 3.5.1 Naïve Bayes (NB) 48 3.5.2 Random Forests (RF) 49 3.5.3 Support Vector Machine (SVM) 49 3.5.4 Logistic Regression (LR) 50 3.6 Methodology 51 3.6.1 Database Used 51 3.6.2 Work Flow 51 3.7 Results and Analysis 52 3.7.1 Performance Metric 52 3.7.2 Experimental Results 52 3.7.2.1 Cleaning Data by Removing Punctuations, White Spaces, and Stop Words 54 3.7.2.2 Stemming the Messages 55 3.7.2.3 Analyzing the Common Words from the Spam and Ham Messages 55 3.7.3 Analyses of Machine Learning Algorithms 55 3.7.3.1 Accuracy Score Before Stemming 55 3.7.3.2 Accuracy Score After Stemming 55 3.7.3.3 Splitting Dataset into Train and Test Data 56 3.7.3.4 Mapping Confusion Matrix 58 3.7.3.5 Accuracy 58 3.8 Conclusion and Future Work 59 References 59 4 Smart Sensor Based Prognostication of Cardiac Disease Prediction Using Machine Learning Techniques 63 4.1 Introduction 64 4.2 Literature Survey 65 4.3 Proposed Method 67 4.4 Data Collection in IoT 67 4.4.1 Fetching Data from Sensors 68 4.4.2 K-Nearest Neighbor Classifier 69 4.4.3 Random Forest Classifier 70 4.4.4 Decision Tree Classifier 70 4.4.5 Extreme Gradient Boost Classifier 71 4.5 Results and Discussions 72 4.6 Conclusion 78 4.7 Acknowledgements 78 References 78 5 Assimilate Machine Learning Algorithms in Big Data Analytics: Review 81 5.1 Introduction 82 5.2 Literature Survey 86 5.3 Big Data 89 5.4 Machine Learning 92 5.5 File Categories 95 5.6 Storage And Expenses 95 5.7 The Device Learning Anatomy 96 5.8 Machine Learning Technology Methods in Big Data Analytics 97 5.9 Structure Mapreduce 97 5.10 Associated Investigations 98 5.11 Multivariate Data Coterie in Machine Learning 99 5.12 Machine Learning Algorithm 99 5.12.1 Machine Learning Framework 99 5.12.2 Parametric and Non-Parametric Techniques in Machine Learning 99 5.12.2.1 Bias 100 5.12.2.2 Variance 100 5.12.3 Parametric Techniques 101 5.12.3.1 Linear Regression 101 5.12.3.2 Decision Tree 101 5.12.3.3 Naive Bayes 102 5.12.3.4 Support Vector Machine 102 5.12.3.5 Random Forest 102 5.12.3.6 K-Nearest Neighbor 103 5.12.3.7 Deep Learning 104 5.12.3.8 Linear Vector Quantization (LVQ) 104 5.12.3.9 Transfer Learning 104 5.12.4 Non-Parametric Techniques 105 5.12.4.1 K-Means Clustering 105 5.12.4.2 Principal Component Analysis 105 5.12.4.3 A Priori Algorithm 105 5.12.4.4 Reinforcement Learning (RL) 105 5.12.4.5 Semi-Supervised Learning 106 5.13 Machine Learning Technology Assessment Parameters 106 5.13.1 Ranking Performance 106 5.13.2 Loss in Logarithmic Form 106 5.13.3 Assessment Measures 107 5.13.3.1 Accuracy 107 5.13.3.2 Precision/Specificity 107 5.13.3.3 Recall 107 5.13.3.4 F-Measure 108 5.13.4 Mean Definite Error (MAE) 108 5.13.5 Mean Quadruple Error (MSE) 108 5.14 Correlation of Outcomes of ML Algorithms 109 5.15 Applications 109 5.15.1 Economical Facilities 109 5.15.2 Business and Endorsement 110 5.15.3 Government Bodies 110 5.15.4 Hygiene 110 5.15.5 Transport 110 5.15.6 Fuel and Energy 111 5.15.7 Spoken Validation 111 5.15.8 Perception of the Device 111 5.15.9 Bio-Surveillance 111 5.15.10 Mechanization or Realigning 111 5.15.11 Mining Text 112 5.16 Conclusion 112 References 113 6 Resource Allocation Methodologies in Cloud Computing: A Review and Analysis 115 6.1 Introduction 116 6.1.1 Cloud Services Models 116 6.1.1.1 Infrastructure as a Service 117 6.1.1.2 Platform as a Service 118 6.1.1.3 Software as a Service 118 6.1.2 Types of Cloud Computing 118 6.1.2.1 Public Cloud 119 6.1.2.2 Private Cloud 119 6.1.2.3 Community Cloud 120 6.1.2.4 Hybrid Cloud 121 6.2 Resource Allocations in Cloud Computing 121 6.2.1 Static Allocation 122 6.2.2 Dynamic Allocation 122 6.3 Dynamic Resource Allocation Models in Cloud Computing 123 6.3.1 Service-Level Agreement Based Dynamic Resource Allocation Models 124 6.3.2 Market-Based Dynamic Resource Allocation Models 125 6.3.3 Utilization-Based Dynamic Resource Allocation Models 126 6.3.4 Task Scheduling in Cloud Computing 127 6.4 Research Challenges 130 6.5 Future Research Paths 131 6.6 Advantages and Disadvantages 131 6.7 Conclusion 135 References 135 7 Role of Machine Learning in Big Data 139 7.1 Introduction 140 7.2 Related Work 141 7.3 Tools in Big Data 142 7.3.1 Batch Analysis Big Data Tools 142 7.3.2 Stream Analysis Big Data Tools 143 7.3.3 Interactive Analysis Big Data Tools 144 7.4 Machine Learning Algorithms in Big Data 145 7.5 Applications of Machine Learning in Big Data 151 7.6 Challenges of Machine Learning in Big Data 154 7.6.1 Volume 154 7.6.2 Variety 156 7.6.3 Velocity 157 7.6.4 Veracity 159 7.7 Conclusion 160 References 161 8 Healthcare System for COVID-19: Challenges and Developments 165 8.1 Introduction 166 8.2 Related Work 167 8.3 IoT with Architecture 169 8.4 IoHT Security Requirements and Challenges 170 8.5 COVID-19 (Coronavirus Disease 2019) 172 8.6 The Potential of IoHT in COVID-19 Like Disease Control 173 8.7 The Current Applications of IoHT During COVID-19 175 8.7.1 Using IoHT to Dissect an Outbreak 175 8.7.2 Using IoHT to Ensure Compliance to Quarantine 176 8.7.3 Using IoHT to Manage Patient Care 176 8.8 IoHT Development for COVID-19 177 8.8.1 Smart Home 178 8.8.2 Smart Office 178 8.8.3 Smart Hotel 178 8.8.4 Smart Hospitals 178 8.9 Conclusion 179 References 179 9 An Integrated Approach of Blockchain & Big Data in Health Care Sector 183 9.1 Introduction 184 9.2 Blockchain for Health care 185 9.2.1 Healthcare data sharing through gem Network 186 9.2.2 OmniPHR 187 9.2.3 Medrec 188 9.2.4 PSN (Pervasive Social Network) System 189 9.2.5 Healthcare Data Gateway 190 9.2.6 Resources that are virtual 190 9.3 Overview of Blockchain & Big data in health care 191 9.3.1 Big Data in Healthcare 191 9.3.2 Blockchain in Health Care 192 9.3.3 Benefits of Blockchain in Healthcare 193 9.3.3.1 Master patient indices 193 9.3.3.2 Supply chain management 193 9.3.3.3 Claims adjudication 193 9.3.3.4 Interoperability 194 9.3.3.5 Single, longitudinal patient records 194 9.4 Application of Big Data for Blockchain 194 9.4.1 Smart Ecosystem 194 9.4.2 Digital Trust 195 9.4.3 Cybersecurity 195 9.4.4 Fighting Drugs 195 9.4.5 Online Accessing of Patient's Data 196 9.4.6 Research as well as Development 196 9.4.7 Management of Data 196 9.4.8 Due to privacy storing of off-chain data 196 9.4.9 Collaboration of patient data 197 9.5 Solutions of Blockchain For Big Data in Health Care 197 9.6 Conclusion and Future Scope 198 References 199 10 Cloud Resource Management for Network Cameras 207 10.1 Introduction 207 10.2 Resource Analysis 210 10.2.1 Network Cameras 210 10.2.2 Resource Management on Cloud Environment 210 10.2.3 Image and Video Analysis 213 10.3 Cloud Resource Management Problems 214 10.4 Cloud Resource Manager 216 10.4.1 Evaluation of Performance 217 10.4.2 View of Resource Requirements 217 10.5 Bin Packing 218 10.5.1 Analysis of Dynamic Bin Packing 219 10.5.2 MinTotal DBP Problem 220 10.6 Resource Monitoring and Scaling 222 10.7 Conclusion 224 References 225 11 Software-Defined Networking for Healthcare Internet of Things 231 11.1 Introduction 231 11.2 Healthcare Internet of Things 233 11.2.1 Challenges in H-IoT 238 11.3 Software-Defined Networking 239 11.4 Opportunities, challenges, and possible solutions 243 11.5 Conclusion 245 References 246 12 Cloud Computing in the Public Sector: A Study 249 12.1 Introduction 250 12.2 History and Evolution of Cloud Computing 251 12.3 Application of Cloud Computing 252 12.4 Advantages of Cloud Computing 258 12.5 Challenges 263 12.6 Conclusion 269 13 Big Data Analytics: An overview 271 13.1 Introduction 271 13.2 Related Work 272 13.2.1 Big Data: What Is It? …”
Format: Electronic eBookFull text (Wentworth users only)
-
143928
Theater and crisis : myth, memory, and racial reckoning in America, 1964-2020
Amherst, Massachusetts : Lever Press, 2024Format: Electronic eBookFull text (Open Access)
-
143929
Spenser's art : a companion to book one of The faerie queene
Cambridge, Mass. : Harvard University Press, 1975Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
143930
Phase Transitions in Cell Biology
Dordrecht : Springer Netherlands, 2008Format: Electronic eBookFull text (Wentworth users only).
-
143931
Extraction 2018 Proceedings of the First Global Conference on Extractive Metallurgy
Cham : Springer International Publishing : Imprint: Springer, 2018Table of Contents: “…Hydrometallurgy 2018 -- Hydrometallurgical Extraction of Lead in Brine Solution from a TSL Processed Zinc Plant Residue -- Alkaline Metals Removal from Radioactive Wastewater by Combined CO2 Capture and Adsorption into Bone Char -- Synthesis and Properties Characterization of Crystalline Polyferric Sulfate Adsorbent Used for Treating High As()-content Contaminated Water -- Custom Fiberglass Reinforced Plastic Piping (FRP) Applications in Mineral Processing -- Electrochemical Behavior of Chalcopyrite in Presence of Sodium Peroxodisulfate -- Alternative Lixiviant for Copper Leaching from Chalcopyrite Concentrate -- Hydrometallurgical Processing of Copper-Arsenic Concentrates -- Sustainable Development Considerations in Copper Hydrometallurgy -- Improved Process for Leaching Refractory Copper Sulfides with Hydrogen Peroxide in Aqueous Ethylene Glycol Solutions -- Copper Recovery from the Mine Tailings by Combination of Flotation with Highpressure Oxidative Leaching and Solvent Extraction -- Douglas Centenary Commemoration - 1918-2018 Engineering the Science: James Douglas, Early Hydrometallurgy and Chile -- Making the Right Selection: A Comparative Analysis for the Treatment of Refractory Gold Concentrates -- Evolution of Metallurgical Parameters at Mantoverde Heap Leaching Operation -- The Effect of Aeration on Chalococite Heap Leaching -- Study of the Diffusion of Cu(II) as an Oxidant Through Simulated Particle Pores in a Novel Model Apparatus -- Filtration Properties of Ferric Hydroxide Precipitate in Nickel Production -- The Effects of Experimental Vari.…”
Format: Electronic eBookFull text (Wentworth users only)
-
143932
Real Estate Economics : a Point-to-Point Handbook.
Hoboken : Taylor and Francis, 2013Table of Contents: “…-- 3.6 Homeownership and the labour market -- Summary of main points -- Review questions and exercises -- 4 RE finance: loans, equity withdrawal, and MBSs -- Learning outcomes -- 4.1 Loans, mortgages, and maths -- 4.2 Forward mortgages: basic loan types -- 4.2.1 The interest-and-capital repayment loan -- 4.2.2 The interest-only loan -- 4.2.3 The low-start loan -- 4.2.4 The stabilized loan -- 4.2.5 The select-payment loan -- 4.2.6 The cap-and-collar loan -- 4.2.7 The index-linked loan -- 4.3 Remortgaging and equity withdrawal -- 4.3.1 Variable versus fixed interest rates -- 4.3.2 From prepayment to refinancing -- 4.3.3 Cash-out refinancing -- 4.3.4 Tapping into one's home equity -- 4.4 Reverse (or equity release) mortgages -- 4.4.1 Mechanics of a reverse mortgage -- 4.4.2 A right interest rate for a reverse mortgage? -- 4.5 Reverse mortgages in the USA and the UK -- 4.6 Housing finance and homeownership -- 4.7 Mortgage securitization (MS) -- 4.7.1 How MS works -- 4.7.2 Types of MBSs -- 4.7.3 Reasons for MS -- 4.7.4 Effect on RE market -- Summary of main points -- Review questions and exercises -- 5 RE as an investment decision -- Learning outcomes -- 5.1 Definition of commercial RE.…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
143933
Sex and the brain
Cambridge, Mass. : MIT Press, 2007Table of Contents: “…Goldman [and others] -- Sex and the single hemisphere : specialization of the right hemisphere for spatial processing / Sandra F. …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
143934
Phase transformations
London : Hoboken, New Jersey : ISTE ; Wiley, 2016Table of Contents: “…Dissymmetrical representation of the right triangle -- 5.2. Representation of phase equilibria -- 5.2.1. …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
143935
CCENT Cisco Certified Entry Networking Technician ICND1 : study guide
Indianapolis, Indiana : Sybex, a Wiley brand, 2016Table of Contents: “…Understanding the Configuration Register Bits -- Checking the Current Configuration Register Value -- Boot System Commands -- Recovering Passwords -- Backing Up and Restoring the Cisco IOS -- Verifying Flash Memory -- Backing Up the Cisco IOS -- Restoring or Upgrading the Cisco Router IOS -- Using the Cisco IOS File System (Cisco IFS) -- Licensing -- Right-To-Use Licenses (Evaluation Licenses) -- Backing Up and Uninstalling the License -- Summary -- Exam Essentials -- Written Lab 8 -- Written Lab 8.1: IOS Management -- Hands-on Labs -- Hands-on Lab 8.1: Backing Up Your Router IOS -- Hands-on Lab 8.2: Upgrading or Restoring Your Router IOS -- Review Questions -- Routing Basics -- The IP Routing Process -- The Cisco Router Internal Process -- Testing Your IP Routing Understanding -- Configuring IP Routing -- Corp Configuration -- SF Configuration -- LA Configuration -- Configuring IP Routing in Our Network -- Static Routing -- Default Routing.…”
Third edition.
Format: Electronic eBookFull text (Wentworth users only)
-
143936
American antislavery writings : colonial beginnings to emancipation
New York, N.Y. : The Library of America, 2012Table of Contents: “…Introduction -- Resolution of Germantown Mennonites / Gerret Hendricks, Derick op de Graeff, Francis Daniell Pastorius, and Abraham op den Graef -- Exhortation & caution to friends concerning buying or keeping of negroes / George Keith -- Selling of Joseph: a memorial / Samuel Sewall -- from The American defence of the Christian golden rule, or an essay to prove the unlawfulness of making slaves of men / John Hepburn -- from A testimony against the anti-Christian practice of making slaves of men / Elihu Coleman -- from All slave-keepers that keep the innocent in bondage / Benjamin Lay -- from The journal, 1755; 1758 / John Woolman -- from Observations on the in slaving, importing and purchasing of Negroes / Anthony Benezet -- Letter to the Virginia Gazette, March 19, 1767 / Arthur Lee -- Conservation on slavery / Benjamin Franklin -- Correspondent, No 8 / John Trumbull -- Ethiopians shall stretch out their hands to God, or a call to the Ethiopians / Jane Dunlap -- from A mite cast into the treasury; or, observations on slave-keeping / David Cooper -- Letter to John Alsop, January 13, 1773 / Patrick Henry -- To the Right Honourable William, Earl of Dartmouth, his majesty's principal secretary of state for North-America, & c -- Letter to the Rev Samson Occom, February 11, 1774 / Phillis Wheatley -- from The reigning abominations, especially the slave trade, considered as causes of lamentation / Elhanan Winchester -- Letter to the Pennsylvania Journal, March 8, 1775 / Thomas Paine -- from Liberty further extended: or free thoughts on the illegality of slave-keeping / Lemuel Haynes -- from A dialogue, concerning the slavery of the Africans / Samuel Hopkins -- from The prospect of peace -- from The Columbiad / Joel Barlow -- Observations on slavery -- from Short observations on slavery / Anthony Benezet -- from A dialogue, in titled, The kind master and the dutiful servant / Jupiter Hammon -- Shandyism / Anonymous -- Letter to Robert Morris, April 12, 1786 -- from Last will and testament / George Washington -- Paradise of Negro-slaves-a dream / Benjamin Rush -- Essay on Negro slavery, No I / Anonymous -- Help! …”
Format: Book
This item is not available through FLO. Please contact your home library for further assistance. -
143937
Revelation verse by verse
Bellingham, WA : Lexham Press, 2016Table of Contents: “…-- Methods of Interpretation -- Author -- Date -- Historical Background -- Use of the Old Testament -- Structure of the Book -- Theology of the Book -- The Sovereignty of God -- The Futility of Satan -- The Doctrine of Christ -- The Holy Spirit -- Cosmic War -- The Doctrine of Sin -- Mission and Evangelism -- The Perseverance of the Saints -- Worship -- Prologue: The Work of the Triune Godhead (1:1-11) -- John Discloses the Four-Stage Process of Revelation (1:1-2) -- John Blesses the Reader and the Heeder (1:3) -- John Greets the Churches and Praises the Trinity (1:4-6) -- Present, past, and Future (1:4A) -- Seven Spirits (1:4B) -- The Attributes of Jesus (1:5-6) -- John Presents the Motto of the Book (1:7-8) -- John Reveals His Own Situation (1:9-11) -- The First Vision: The Glory and Power of Christ (1:12-20) -- John Sees a Vision of the Exalted Christ (1:12-16) -- The Long Robe and Golden Sash (1:13) -- White Head and Hair (1:14A) -- Blazing Eyes (1:14B) -- Bronze Feet (1:15A) -- Powerful Voice (1:15B) -- Stars in His Right Hand (1:16A) -- Sword from His Mouth (1:16B) -- Radiant Face (1:16C) -- Christ Expands John's Commission (1:17-20) -- Letters to the Seven Churches, Part 1: A Truly Biblical Church (2:1-7, 12-29) -- Ephesus: Restore Your First Love (2:1-7) -- The City -- Jesus Identifies Himself (2:1) -- Situation and Strengths (2:2-3) -- Weakness (2:4) -- Solution (2:5-6) -- Call to Listen and Challenge to Overcome (2:7) -- Pergamum: Live Faithfully in Satan's Realm (2:12-17) -- The City -- Jesus Identifies Himself (2:12) -- Situation and Strengths (2:13) -- Weakness (2:14-15) -- Solution (2:16) -- Call to Listen and Challenge to Overcome (2:17) -- Thyatira: Protect the Church (2:18-29) -- The City.…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
143938
Advanced Computational Electromagnetic Methods.
Norwood : Artech House, 2015Table of Contents: “…2.7 ADVANCED FORMS OF HIGH-ORDER FDTD ALGORITHMS -- REFERENCES -- 3.1 INTRODUCTION -- 3.2 FDTD CODE FOR MICROWAVE CIRCUIT SIMULATION -- 3.3 FDTD CODE USING CUDA -- 3.4 NUMERICAL RESULTS -- REFERENCES -- 4.1 INTRODUCTION -- 4.2 CURRENT STATE OF THE ART -- 4.3 FDTD EARTH-IONOSPHERE MODEL OVERVIEW -- 4.4 NEW MAGNETIZED IONOSPHERIC PLASMA ALGORITHM -- 4.5 STOCHASTIC FDTD (S-FDTD) -- 4.6 INPUT TO FDTD/S-FDTD EARTH-PLAMSA IONOSPHERE MODELS -- 4.7 CONCLUSIONS -- REFERENCES -- 5.1 INTRODUCTION -- 5.2 ENVIRONMENT REQUIREMENTS AND SETTINGS -- 5.3 CODE DEVELOPMENT -- 5.4 NUMERICAL RESULTS -- REFERENCES -- 6.1 FETI METHODS WITH ONE AND TWO LAGRANGE MULTIPLIERS -- 6.2 FETI-DP METHODS WITH ONE AND TWO LAGRANGE MULTIPLIERS -- 6.3 LM-BASED NONCONFORMAL FETI-DP METHOD -- 6.4 CE-BASED NONCONFORMAL FETI-DP METHOD -- 6.5 FETI-DP METHOD ENHANCED BY THE SECOND-ORDER TRANSMISSION CONDITION -- 6.6 HYBRID NONCONFORMAL FETI/CONFORMAL FETI-DP METHOD -- 6.7 NUMERICAL EXAMPLES -- 6.8 SUMMARY -- REFERENCES -- 7.1 NORMALIZED RESIDUAL ERROR -- 7.2 HIGH-ORDER TREATMENT OF SMOOTH TARGETS -- 7.3 THE DIPOLE ANTENNA -- 7.4 HIGH-ORDER TREATMENT OF WEDGE SINGULARITIES -- 7.5 HIGH-ORDER TREATMENT OF JUNCTIONS -- 7.7 PROSPECTS FOR CONTROLLED ACCURACY COMPUTATIONS IN THREE-DIMENSIONAL PROBLEMS -- 7.8 SUMMARY -- REFERENCES -- 8.1 INTRODUCTION -- 8.2 LOW RANK PROPERTY OF SUBMATRICES OF PARTITIONED IMPEDANCE MATRIX -- 8.3 PARTITIONING OF THE COMPUTATIONAL DOMAIN -- 8.4 LOW RANK MATRIX DECOMPOSITION -- 8.5 LOW RANK DECOMPOSITION OF MULTIPLE RIGHT SIDES -- 8.6 DIRECT SOLVER BASED ON BLOCK LU DECOMPOSITION -- 8.7 PARALLELIZATION VIA OPENMP AND BLAS LIBRARY -- 8.8 NUMERICAL EXAMPLES -- 8.9 SUMMARY -- REFERENCES -- 9.1 INTRODUCTION -- 9.2 PHYSICS-BASED MODELING FOR THE ANALYSIS OF THE MACHINE DRIVE -- 9.3 EQUIVALENT SOURCE MODELING -- 9.4 POWER CONVERTERS.…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
143939
Microsoft System Center 2016 Service Manager Cookbook - Second Edition.
Birmingham : Packt Publishing, 2017Table of Contents: “…. -- Sending different notifications regarding a Service Request -- Notification for activities in Service Requests -- See also -- Chapter 6: Deploying and Configuring the HTML5 Self-Service Portal -- Introduction -- Choosing the right deployment model -- Getting ready -- How to do it ... -- How it works ... -- Deploying the HTML5 Self-Service Portal -- Getting ready -- How to do it ... -- How it works ... -- There's more ... -- Configuring permissions -- Getting ready -- How to do it ... -- Setting up the catalog group -- Setting up the User Role -- How it works ... -- There's more ... -- Configuring cache settings -- Getting ready -- How to do it ... -- Clearing the HTML5 portal cache -- Modifying the cache settings -- Customizing the Self-Service Portal -- Getting ready -- How to do it ... -- General customizations -- Title -- Logo -- Service Desk phone number -- Service Desk e-mail -- How it works ... -- There's more ... -- Customizing the Self-Service Portal further -- Getting ready -- How to do it ...…”
2nd ed.
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
143940
Advanced testing of systems-of-systems. 2, Practical aspects
London, UK : Hoboken, NJ : ISTE Ltd. ; John Wiley & Sons, Inc., 2022Table of Contents: “…Product metrics -- 6.3.1. FTR: first time right -- 6.3.2. Coverage rate -- 6.3.3. Code churn -- 6.4. …”
Format: Electronic eBookFull text (Wentworth users only)