Search alternatives:
"files features ;" » "file features ;" (Expand Search), "films features ;" (Expand Search)
Showing 1 - 17 results of 17 for search '(("miles lectures ;") OR ("files features ;"))*', query time: 0.37s Refine Results
  1. 1

    MATLAB primer by Davis, Timothy A.

    Boca Raton, Fla. : Chapman & Hall/CRC, 2005
    Seventh edition.
    Table of Contents: “…chapter 1 Accessing MATLAB -- chapter 3 Matrices and Matrix Operations -- chapter 4 Submatrices and Colon Notation -- chapter 5 MATLAB Functions -- chapter 6 Control Flow Statements -- chapter 7 M-files -- chapter 8 Advanced M-file Features -- chapter 9 Calling C from MATLAB -- chapter 10 Calling Fortran from MATLAB -- chapter 11 Calling Java from MATLAB -- chapter 12 Two-Dimensional Graphics -- chapter 13 Three-Dimensional Graphics -- part 14 Advanced Graphics -- chapter 15 Sparse Matrix Computations -- chapter 16 The Symbolic Math Toolbox -- chapter 17 Polynomials, Interpolation, and Integration -- chapter 18 Solving Equations -- chapter 19 Displaying Results -- part 20 Cell Publishing -- chapter 21 Code Development Tools -- chapter 22 Help Topics -- chapter 23 Additional Resources.…”
    Format: Electronic eBook
    Full text (WIT users only)
  2. 2

    HTML5 Multimedia Developer's Guide by Bluttman, Ken, Cottrell, Lee

    McGraw-Hill, 2012
    1st edition.
    Format: Electronic eBook
    Full text (Wentworth users only)
  3. 3

    WiX A Developer's Guide to Windows Installer XML. by Ramirez, Nick

    Birmingham : Packt Pub., 2010
    Table of Contents: “…; Votive; A word about GUIDs; Your first WiX project; XML declaration and Wix element; Product element; Package element; Media element; Directories; Components; Files; Features.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  4. 4
  5. 5

    Linux essentials by Bresnahan, Christine, Blum, Richard

    Indianapolis, Indiana : Sybex, a Wiley Brand, 2015
    Second edition.
    Table of Contents: “…Using Variables -- Using Conditional Expressions -- Using Loops -- Using Functions -- Setting the Script's Exit Value -- ch. 12 Understanding Basic Security -- Understanding Accounts -- Using Account Tools -- Working as root -- ch. 13 Creating Users and Croups -- Creating New Accounts -- Modifying Accounts -- Deleting Accounts -- Managing Groups -- ch. 14 Setting Ownership and Permissions -- Setting Ownership -- Setting Permissions -- Using Special Permission Bits and File Features -- ch. 15 Managing Network Connections -- Understanding Network Features -- Configuring a Network Connection -- Testing Your Network Connection -- Protecting Your System from the Bad Guys.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Access E-Book
    Full text (Wentworth users only)
  6. 6

    Linux essentials by Smith, Roderick W.

    Indianapolis, Ind. : Wiley, 2012
    Table of Contents: “…Working as rootThe Essentials and Beyond; Chapter 14: Creating Users and Groups; Creating New Accounts; Modifying Accounts; Deleting Accounts; Managing Groups; The Essentials and Beyond; Chapter 15: Setting Ownership and Permissions; Setting Ownership; Setting Permissions; The Essentials and Beyond; Chapter 16: Navigating the Linux Filesystem; Understanding Where Things Go; Using Special Permission Bits and File Features; The Essentials and Beyond; Chapter 17: Managing Network Connections; Understanding Network Features; Configuring a Network Connection; Testing Your Network Connection…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  7. 7

    Computer Science and Its Applications 5th IFIP TC 5 International Conference, CIIA 2015, Saida, Algeria, May 20-21, 2015, Proceedings

    Cham : Springer International Publishing : Imprint: Springer, 2015
    Table of Contents: “…Binary Bat Algorithm: On the Efficiency of Mapping Functions When Handling Binary Problems Using Continuous-Variable-Based Metaheuristics -- Relative Timed Model for Coordinated Multi Agent Systems -- A Novel Technique for Human Face Recognition Using Fractal Code and Bi-dimensional Subspace -- A New Rotation-Invariant Approach for Texture Analysis -- Multi-CPU/Multi-GPU Based Framework for Multimedia Processing -- Full-Reference Image Quality Assessment Measure Based on Color Distortion -- Biomarker Discovery Based on Large-Scale Feature Selection and MapReduce -- Social Validation of Solutions in the Context of Online Communities: An Expertise-Based Learning Approach -- Remotely Sensed Data Clustering Using K-Harmonic Means Algorithm and Cluster Validity Index -- Comparison of Automatic Seed Generation Methods for Breast Tumor Detection Using Region Growing Technique -- IHBA: An Improved Homogeneity-Based Algorithm for Data Classification -- Multiple Guide Trees in a Tabu Search Algorithm for the Multiple Sequence Alignment Problem -- Noise Robust Features Based on MVA Post-Processing -- Arabic Texts Categorization: Features Selection Based on the Extraction of Words’ Roots -- Restoration of Arabic Diacritics Using a Multilevel Statistical Model -- A New Multi-layered Approach for Automatic Text Summaries Mono-Document Based on Social Spiders -- Building Domain Specific Sentiment Lexicons Combining Information from Many Sentiment Lexicons and a Domain Specific Corpus -- Improved Cuckoo Search Algorithm for Document Clustering -- Supporting Legal Requirements in the Design of Public Processes -- Requirement Analysis in Data Warehouses to Support External Information -- Engineering the Requirements of Data Warehouses: A Comparative Study of Goal-Oriented Approaches -- Research and Analysis of the Stream Materialized Aggregate List -- SOLAP On-the-Fly Generalization Approach Based on Spatial Hierarchical Structures -- QoS-Aware Web Services Selection Based on Fuzzy Dominance -- A Hybrid Model to Improve Filtering Systems -- Towards a Recommendation System for the Learner from a Semantic Model of Knowledge in a Collaborative Environment -- Toward a New Recommender System Based on Multi-criteria Hybrid Information Filtering -- A New Approach for Combining the Similarity Values in Ontology Alignment -- Defining Semantic Relationships to Capitalize Content of Multimedia Resources -- A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques -- On Copulas-Based Classification Method for Intrusion Detection -- On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks -- A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features -- Balanced and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks -- Distributed Algorithm for Coverage and Connectivity in Wireless Sensor Networks -- Optimizing Deployment Cost in Camera-Based Wireless Sensor Networks -- A Version of LEACH Adapted to the Lognormal Shadowing Model -- High Velocity Aware Clocks Synchronization Approach in Vehicular Ad Hoc Networks -- An Energy-Efficient Fault-Tolerant Scheduling Algorithm Based on Variable Data Fragmentation -- Genetic Centralized Dynamic Clustering in Wireless Sensor Networks -- Region-Edge Cooperation for Image Segmentation Using Game Theory -- Improved Parameters Updating Algorithm for the Detection of Moving Objects -- Towards Real-Time Co-authoring of Linked-Data on the Web -- A High Level Net for Modeling and Analysis Reconfigurable Discrete Event Control Systems -- Hybrid Approach for Metamodel and Model Co-evolution -- Extracting and Modeling Design Defects Using Gradual Rules and UML Profile -- An Approach to Integrating Aspects in Agile Development -- On the Optimum Checkpointing Interval Selection for Variable Size Checkpoint Dumps -- Monitoring Checklist for Ceph Object Storage Infrastructure -- Towards a Formalization of Real-Time Patterns-Based Designs.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  8. 8

    International Conference on Computing, Communication, Electrical and Biomedical Systems

    Cham : Springer International Publishing : Imprint: Springer, 2022
    1st ed. 2022.
    Table of Contents: “…Part I -- Designing an ML - Based Congestion Detection Algorithm for Routing Data in MANETs -- Empirical Analysis of Effect of Resampling on Supervised Learning Algorithms in Predicting Types of Lung Cancer on Multiclass Imbalanced Micro Array Gene Expression Data -- Artificial Intelligence to Protect Cyber Security Attack on Cloud E-Learning Tools (AI- PCE) -- Online OPD Management with Rating and Review System to Hospitals and Doctors -- Design and Analysis of Various Non-Radiating Transmission Line Structures on a High-Speed PCB’s -- Mediating Effect of Quality Enhancement between ICT-Related Factors and Student Satisfaction in Open and Distance Education -- Synthesis and Characterization of Nano Particles -- Unisum Labeling of Hydra Hexagons -- An Implementation of Mobile Shareable Content Oject Reference Model for Online Assessment using Virtal Learning Environment -- A Finest Secured Routing Techniques With Transmision Of Data In Mobile Adhoc Newtorks -- Evaluation of Various Cryptographic Techniques Based on File Size on Cloud Storage Security -- Cloud Based Bio-Metric Enhanced ATM Powered by Deep Learning -- Data Mining In Health Care: Application Perspective -- A Hybrid Filter Wrapper Embedded Feature Selection for Selecting Important Attributes and Prediction of Chronic Kidney Disease -- A Survey on Algorithms in Game Theory in Big Data -- RG Technique to Reduce the Fuel Consumption and Co2 Emission in Vanet -- Emphasizing a productive and protective access control to improve authentication using 802.1X with Software Defined Networks -- Feature Extraction by Rework Image Recognition (RIR) Learning Model -- Part II -- Comprehensive Deep Recurrent Artificial Neural Network (CDRANN) - Evolutionary Model for Future Prediction -- An Efficient Navigation Approach for Toll Plaza using Map Matching Algorithm with Hidden Markov Model -- Mining Of Customer Review Feedback Using Sentiment Analysis For Smart Phone Product -- Privacy Preservation framework for Bigdata Analysis -- Interactive artificial neural network model for UX design -- Multimodal Biometric Person Identification System Based on Speech and Keystroke Dynamics -- Predictive Water Quality Modelling using ARIMA and VAR for Locations of Krishna River, Andhra Pradesh, India -- Selection of Routing Protocol Based Qos Improvement for Mobile Adhoc Network -- Multi Clustering Management (MC-M) based Segmentation of multiple organs from Abdominal CT images -- Efficient Performance of Data Science Application in Medical Field -- Enhancing Social Divergence using Genetic Algorithms and Linked Open Data for improving Immunity System against COVID-19 -- Ethereum Based P2P Lending System (Dao App) - Qualitative Review of a Possible Replacement for Lending Practices -- Malware Detection based on Portable Executable file features -- Design IoT Based Blind Stick for Visually Disabled Persons -- Collaborative Interactive Workspace Environment using Augmented Reality -- Analysis and Prediction of Covid-19 Cases Using Machine Learning Algorithms -- Food Detection and Nutritional Recognition System using Neural Networks -- Online shipping management firm with route and cost optimization for warehouses -- Digital Certificate Based User Authentication to Access Networks and Hosts -- Wield Nodemcu IOT To Shelter Coal Mining -- Pancreases Segmentation and classification based on RCNN and AlexNet -- A Compact Wideband dielectric resonator antenna for 5G applications -- Development of FLC Based AC to AC Converter for Wind Energy -- Energy management system for small scale hybrid wind solar battery based microgrid -- EYE-TM :An Automatic Teller Machine for the visually- impaired -- High-Capacity Reversible Data hiding using lossless LZW compression -- Tropical Cyclone detection using Optical flow estimation Deep Learning -- Importance of Information and Communication Technology (ICT) in Higher Education Paper -- A brief analysis of Border Gateway Protocol for Internet Controlling and Malicious Attacks -- Hybrid Blind Watermarking using RDWT-DCT in Singular Value Decomposition Domain -- A Real and Accurate Data Traffic Control in Wireless Sensor Networks Using CSMA Model -- A Novel Approach for File Security in Cloud -- Malicious Firmware Injection Detection on Wireless Networks using Deep Learning TF-IDF Normalization (MFI-IDF) -- An Efficient Authentication Using Monitoring Scheme for Node Misbehavior Detection in Manet -- A Framework for Analysis of Network Traffic using Predictive Algorithm -- A Review on Deep Learning Technique on Basis of Different Types of Crop Diseases -- Food Plant Diversity of Homestead Gardens in Cherangode Panchayath of Nilgiri District, TamilNadu.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  9. 9

    Audio IC Projects by Brindley, Keith

    Newnes, 2013
    1st edition.
    Format: Electronic eBook
    Full text (Wentworth users only)
  10. 10

    Adaptive Filtering by Poularikas, Alexander

    CRC Press, 2017
    1st edition.
    Format: Electronic eBook
    Full text (Wentworth users only)
  11. 11

    Infernal affairs 2

    Santa Monica, CA : Genius Products, Inc., 2007
    Special collector's ed.
    Format: Video

    This item is not available through FLO. Please contact your home library for further assistance.
  12. 12

    Infernal affairs 2

    Santa Monica, CA : Genius Products, Inc., 2007
    Special collector's ed.
    Format: Video

    This item is not available through FLO. Please contact your home library for further assistance.
  13. 13

    Mr. & Mrs. Smith

    Beverly Hills, Calif. : 20th Century Fox Home Entertainment, 2006
    Unrated ; widescreen.
    Format: Video

    This item is not available through FLO. Please contact your home library for further assistance.
  14. 14

    Mr. & Mrs. Smith

    Beverly Hills, Calif. : 20th Century Fox Home Entertainment, 2006
    Unrated ; widescreen.
    Format: Video

    This item is not available through FLO. Please contact your home library for further assistance.
  15. 15

    Multimedia Introduction to Programming Using Java by Gries, David

    New York, NY : Springer New York, 2005
    Format: Electronic eBook
    Full text (Wentworth users only).
  16. 16

    Boogie nights

    [United States] : New Line Home Entertainment, 2007
    Format: Video

    This item is not available through FLO. Please contact your home library for further assistance.
  17. 17

    Boogie nights

    [United States] : New Line Home Entertainment, 2007
    Format: Video

    This item is not available through FLO. Please contact your home library for further assistance.