Showing 142,541 - 142,560 results of 155,842 for search '((("klight" OR "slight") OR (((((("sight" OR "might") OR "fight") OR "slightly") OR "flight") OR ((("fright" OR (("wrightss" OR ("fights" OR "lights")) OR ("fights" OR "lights"))) OR "eight") OR ((("wrightss" OR "weight") OR ("rightss" OR "rightsss")) OR "heights"))) OR ("fightly" OR (((("frightssly" OR "frightsly") OR ("frightsly" OR "wrightsly")) OR (("wrightsssly" OR "wrightsly") OR ("mightsssly" OR "lightsssly"))) OR ("rightssly" OR "rightssssly"))))) OR ("right" OR "light"))', query time: 2.20s Refine Results
  1. 142541

    Macbeth: The Tragic Pair.

    [San Francisco, California, USA] : Kanopy Streaming, 2016
    Format: Electronic Video
    Streaming video (Wentworth users only)
  2. 142542

    Art of the Japanese Sword.

    [San Francisco, California, USA] : Kanopy Streaming, 2016
    Format: Electronic Video
    Streaming video (Wentworth users only)
  3. 142543

    King and Country.

    [San Francisco, California, USA] : Kanopy Streaming, 2016
    Format: Electronic Video
    Streaming video (Wentworth users only)
  4. 142544

    QLab 4 Show Control, 2nd Edition by Hopgood, Jeromy

    Focal Press, 2017
    2nd edition.
    Format: Electronic eBook
    Full text (Wentworth users only)
  5. 142545

    Drought : science and policy

    Hoboken, NJ : John Wiley & Sons, Ltd, 2019
    Table of Contents: “…2.6.3 Selection of policy-relevant variables -- 2.6.3.2 Composite indicator of drought vulnerability (weighting and aggregation) -- 2.6.4 Application: Drought risk assessment in Latin America -- References -- Chapter 2.7: Drought Vulnerability Under Climate Change: A Case Study in La Plata Basin -- 2.7.1 Introduction -- 2.7.2 Methods -- 2.7.3 Results and discussion -- 2.7.4 Conclusions -- Acknowledgements -- References -- Chapter 2.8: Drought Insurance -- 2.8.1 Introduction -- 2.8.2 Main difficulties and challenges in developing drought insurance -- 2.8.3 Types of drought insurance -- 2.8.4 Drought indemnity-based insurance -- 2.8.5 Drought index-based insurance -- 2.8.6 Conclusions -- Acknowledgements -- References -- Part Three: Drought Management Experiences and Links to Stakeholders -- Chapter 3.9: Drought and Water Management in The Netherlands -- 3.9.1 General context -- 3.9.2 Drought risk and mitigation -- 3.9.3 Conclusions -- Future needs -- References -- Chapter 3.10: Improving Drought Preparedness in Portugal -- 3.10.1 Local context -- 3.10.2 Current approach to drought monitoring and management -- 3.10.3 Improving drought preparedness and drought management -- 3.10.4 Conclusions -- Acknowledgements -- References -- Chapter 3.11: Drought Management in the Po River Basin, Italy -- 3.11.1 General context -- 3.11.2 Drought risk and mitigation -- 3.11.3 Conclusions -- References -- Chapter 3.12: Experiences in Proactive and Participatory Drought Planning and Management in the Jucar River Basin, Spain -- 3.12.1 Introduction -- 3.12.2 Droughts characterisation -- 3.12.3 Methods for drought vulnerability and risk assessment -- 3.12.4 Proactive and participatory drought management -- 3.12.5 Conclusions -- Acknowledgements -- References -- Chapter 3.13: Drought Risk and Management in Syros, Greece -- 3.13.1 Introduction -- 3.13.2 Droughts in Syros.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  6. 142546

    Artificial Intelligence and Security 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part II

    Cham : Springer International Publishing : Imprint: Springer, 2021
    1st ed. 2021.
    Table of Contents: “…Big Data -- Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform -- Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis -- Exploring the informationization of Land Reserve Archives Management -- Research and Implementation of Anomaly Detection Algorithm in Data Mining -- An Empirical Study on Data Sampling for Just-in-Time Defect Prediction -- Design and Implementation of Data Adapter in SWIM -- Cloud Computing and Security -- Encrypted Medical Records Search with Supporting of Fuzzy Multi-Keyword and Relevance Ranking -- A Container-oriented Virtual-machine-introspection-based Security Monitor to Secure Containers in Cloud Computing -- A Computing Task Offloading Scheme for Mobile Edge Computing -- Security Transmission Scheme of Sensitive Data for Mobile Terminal -- Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain -- A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring -- Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Network -- Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature -- Detection of Virtual Machines based on Thread Scheduling -- Graph Attention Network for Word Embeddings -- Firewall Filtering Technology And Application Based On Decision Tree -- Encryption and Cybersecurity -- A DAPP business data storage model based on blockchain and IPFS -- IPv6-Darknet Network Traffic Detection -- Neural Control Based Research of Endogenous Security Model -- Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes -- A Post-Quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy -- A transaction model of bill service based on blockchain -- An N-gram Based Deep Learning Method for Network Traffic Classification -- Interpretability Framework of Network Security Traffic Classification Based on Machine Learning -- Random Parameter Normalization Technique for Mimic Defense based on Multi-queue Architecture -- A Secure and Efficient Key Hierarchical Management and Collaborative Signature Scheme of Blockchain -- Information Hiding -- Covert Communication via Modulating Soft Label of Neural Network -- DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography -- Halftone Image Steganography Based on Reassigned Distortion Measurement -- Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units -- High efficiency quantum image steganography protocol based on ZZW framework -- Halftone Image Steganalysis by Reconstructing Grayscale Image -- Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition -- Research and Implementation of Medical Information Protection and Sharing based on Blockchain -- IoT Security -- LoRa Network Security Schemes Based on RF Fingerprint -- Smart Home based Sleep Disorder Recognition for Ambient Assisted Living -- Blockchain-based reliable collection mechanism for smart meter quality data -- Power Blockchain Guarantee Mechanism Based on Trusted Computing -- Analysis and Implementation of Distributed DTU Communication Method Based on DDS Protocol -- Sensor Failure Detection Based on Programmable Switch and Machine Learning -- A Solution to Reduce Broadcast Storm in VANET -- a Vehicle Intrusion Detection System Based on Time Interval and Data Field -- An Authentication Mechanism for IoT Devices Based on Accountable and Revocable Identify-based Encryption -- A Load-balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections -- Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA -- Opportunistic network performance optimization model based on a combination of neural networks and orthogonal experiments -- Security analysis of measurement automation system based on threat intelligence -- A MOEA-D-based Service Quality Matching Optimization Algorithm in Electric Power Communication Network -- Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature Learning -- Recent Development, Trends and Challenges in IoT Security -- Energy Optimization for Wild Animal Tracker basing on watchdog technology -- Performance comparison of curve fitting and compressed sensing in channel state information feature extraction -- Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal Strength -- Wi-Fi Indoor Positioning Using D-S Evidence Theory -- A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System -- Multimedia Forensics -- Trusted digital asset copyright confirmation and transaction mechanism based on consortium blockchain -- Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method -- A Fast Tongue Image Color Correction Method Based on Gray World Method -- Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image Retrieval.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  7. 142547

    Active Media Technology 8th International Conference, AMT 2012, Macau, China, December 4-7, 2012. Proceedings by Huang, Runhe

    Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012
    Table of Contents: “…Active Media Data Mining and Machine Learning Techniques -- Movie Genre Classification Using SVM with Audio and Video Features -- Automatic Player Behavior Analyses from Baseball Broadcast Videos -- Hot Topic Detection in News Blogs from the Perspective of W2T -- A Clustering Ensemble Based on a Modified Normalized Mutual Information Metric -- Influence of Erroneous Pairwise Constraints in Semi-supervised Clustering -- User Correlation Discovery and Dynamical Profiling Based on Social Streams -- Extraction of Human Social Behavior from Mobile Phone Sensing -- Continuity of Defuzzification on L2 Space for Optimization of Fuzzy Control -- A On-Line News Documents Clustering Method -- Agent-Based Applications and Multi-agent Systems Distributed Protocols for Multi-Agent Coalition Formation: A Negotiation Perspective -- Multi-agent Liquidity Risk Management in an Interbank Net Settlement System -- An Enhanced Mechanism for Agent Capability Reuse -- A Bayesian Network Approach to Investigating User-Robot Personality Matching -- Modelling Multi-Criteria Decision Making Ability of Agents in Agent-Based Rice Pest Risk Assessment Model -- Agent Based Assistance for Electric Vehicles – An Evaluation -- Ubiquitous Intelligent Devices and Systems -- Event Calculus-Based Adaptive Services Composition Policy for AmI Systems -- QoS- and Resource-Aware Service Composition and Adaptation -- An Event-Driven Energy Efficient Framework for Wearable Health-Monitoring System -- Learning Style Model for e-Learning Systems -- A Trajectory-Based Recommender System for Tourism -- An Adaptive Method for the Tag-Rating-Based Recommender System -- Comparative Study of Joint Decision-Making on Two Visual Cognition Systems Using Combinatorial Fusion -- Active Media Based Information Retrieval and Processing -- Research on Touch as a Means of Interaction in Digital Art -- Perceptual Image Hashing with Histogram of Color Vector Angles -- Data Hiding Method Based on Local Image Features -- Fast Flow Visualization on CUDA Based on Texture Optimization -- A Message Passing Graph Match Algorithm Based on a Generative Graphical Model -- Fast Content-Based Retrieval from Online Photo Sharing Sites -- Interactive Exploration of Image Collections on Mobile Devices -- The Derived Kernel Based Recognition Method of Vehicle Type -- An Approach to Define Flexible Structural Constraints in XQuery -- DC Stream Based JPEG Compressed Domain Image Retrieval -- Semantic Computing for ActiveMedia, Social Networks, and AMT-Based Systems A Comparative Study of Community Structure Based Node Scores for Network Immunization -- Semantic Precision and Recall for Evaluating Incoherent Ontology Mappings -- A Self-organization Method for Reorganizing Resources in a Distributed Network -- Extracting Property Semantics from Japanese Wikipedia -- An Ontology Based Privacy Protection Model for Third-Party Platform -- Evaluating Ontology-Based User Profiles -- Semantic Information with Type Theory of Acyclic Recursion -- Pyxis: An Active Replication Approach for Enhancing Social Media Services -- Social Network Analysis of Virtual Worlds -- Active Media Framework for Network Processing Components -- Semantic Network Monitoring and Control over Heterogeneous Network Models and Protocols -- International Workshop on Meta-synthesis and Complex Systems -- Opinion Dynamics on Triad Scale Free Network -- Distribution of Node Characteristics in Complex Networks of Tree Class -- Dynamic Mergers Drive Industrial Competition Evolution: A Network Analysis Perspective -- A Study of Collective Action Threshold Model Based on Utility and Psychological Theories -- Recognition of Online Opinion Leaders Based on Social Network Analysis -- Critical Infrastructure Management for Telecommunication Networks -- Developing Self-Organizing Systems by Policy-Based Self-Organizing Multi-Agent Systems -- On Prioritized 2-tuple Ordered Weighted Averaging Operators -- Special Session on Social Knowledge Discovery and Management -- A Novel Collaboration Partner Model Based on the Personal Relationships of SNS -- An Innovative Way for Mining Clinical and Administrative Healthcare Data -- An Adaptive Recommendation System for Museum Navigation -- Adaptive SVM-Based Classification Systems Based on the Improved Endocrine-Based PSO Algorithm -- A Probability Model for Recognition of Dynamic Gesture Based on a Finger-Worn Device -- Design of a Situation-Aware System for Abnormal Activity Detection of Elderly People -- Special Session on Human-Computer Interaction and Knowledge Discovery from Big Data -- Revealing Cultural Influences in Human Computer Interaction by Analyzing Big Data in Interactions -- Predicting Student Exam’s Scores by Analyzing Social Network Data -- SPTrack: Visual Analysis of Information Flows within SELinux Policies and Attack Logs -- Using Mixed Node Publication Network Graphs for Analyzing Success in Interdisciplinary Teams -- On Text Preprocessing for Opinion Mining Outside of Laboratory Environments -- Human Involvement in Designing an Information Quality Assessment Technique - Demonstrated in a Healthcare Setting -- On Applying Approximate Entropy to ECG Signals for Knowledge Discovery on the Example of Big Sensor Data -- Towards a Framework Based on Single Trial Connectivity for Enhancing Knowledge Discovery in BCI.…”
    Format: Electronic eBook
    Full text (Wentworth users only).
  8. 142548

    Project Management and Engineering Selected Papers from the 17th International AEIPRO Congress held in Logroño, Spain, in 2013

    Cham : Springer International Publishing : Imprint: Springer, 2015
    Table of Contents: “…ENVIRONMENTAL ENGINEERING AND NATURAL RESOURCE MANAGEMENT -- Multicriteria decision making methodologies applied to the selection of best available techniques in the ceramic industry: equalitarian vs. prioritised weighting, by Ibáñez-Forés V, Aragonés P, Bovea MD -- LABWASTE.12: Calculation tool for the design of solid waste landfills with inert waste recovery, by Esteban J, Colomer F, Carlos M, Gallardo A -- Synergy as strategy for the energetic valorisation of waste focused in transport, by Álvarez J.V, Luiña R, Ortega F, Lobo P -- Design of an SRF from refuse from a municipal waste treatment plant, by Gallardo A, Gómez A.M, Colomer F.J, Edo N, Pascual P -- Local analysis of the characteristics and frequency of extreme droughts in Málaga using the SPI (Standardized Precipitation Index), by Ayuso J.L, Ayuso-Ruiz P, García A, Estévez J, Taguas E.V -- IV. …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  9. 142549

    Vibration Problems in Structures : Practical Guidelines by Bachmann, Hugo

    Basel : Birkhäuser Basel, 1995
    Table of Contents: “…1 Vibrations induced by people -- 1.1 Pedestrian bridges -- 1.2 Floors with walking people -- 1.3 Floors for sport or dance activities -- 1.4 Floors with fixed seating and spectator galleries -- 1.5 High-diving platforms -- References to Chapter 1 -- 2 Machinery-induced vibrations -- 2.1 Machine foundations and supports -- 2.2 Bell towers -- 2.3 Structure-borne sound -- 2.4 Ground-transmitted vibrations -- References to Chapter 2 -- 3 Wind-induced vibrations -- 3.1 Buildings -- 3.2 Towers -- 3.3 Chimneys and Masts -- 3.4 Guyed Masts -- 3.5 Pylons -- 3.6 Suspension and Cable-Stayed Bridges -- 3.7 Cantilevered Roofs -- References to Chapter 3 -- 4 Vibrations induced by traffic and construction activity -- 4.1 Roads -- 4.2 Railways -- 4.3 Bridges -- 4.4 Construction Work -- References to Chapter 4 -- A Basic vibration theory and its application to beams and plates -- A.1 Free vibration -- A.2 Forced vibration -- A.3 Harmonic excitation -- A.4 Periodic excitation -- A.4.1 Fourier analysis of the forcing function -- A.4.2 How the Fourier decomposition works -- A.4.3 The Fourier Transform -- A.5 Tuning of a structure -- A.6 Impedance -- A.7 Vibration Isolation (Transmissibility) -- A.8 Continuous systems and their equivalent SDOF systems -- B Decibel Scales -- B.1 Sound pressure level -- B.2 Weighting of the sound pressure level -- C Damping -- C.1 Introduction -- C.2 Damping Quantities (Definitions, Interpretations) -- C.3 Measurement of damping properties of structures -- C.3.1 Decay curve method -- C.3.2 Bandwidth method -- C.3.3 Conclusions -- C.4 Damping mechanisms in reinforced concrete -- C.5 Overall damping of a structure -- C.5.1 Damping of the bare structure -- C.5.2 Damping by non-structural elements -- C.5.3 Damping by energy radiation to the soil -- C.5.4 Overall damping -- D Tuned vibration absorbers -- D.1 Definition -- D.2 Modelling and differential equations of motion -- D.3 Optimum tuning and optimum damping of the absorber -- D.4 Practical hints -- E Wave Propagation -- E.1 Introduction -- E.2 Wave types and propagation velocities -- E.3 Attenuation laws -- F Behaviour of concrete and steel under dynamic actions -- F.1 Introduction -- F.2 Behaviour of concrete -- F.2.1 Modulus of elasticity -- F.2.2 Compressive strength -- F.2.3 Ultimate strain in compression -- F.2.4 Tensile strength -- F.2.5 Ultimate strain in tension -- F.2.6 Bond between reinforcing steel and concrete -- F.3 Behaviour of reinforcing steel -- F.3.1 Modulus of Elasticity -- F.3.2 Strength in Tension -- F.3.3 Strain in tension -- G Dynamic forces from rhythmical human body motions -- G.1 Rhythmical human body motions -- G.2 Representative types of activity -- G.3 Normalised dynamic forces -- H Dynamic effects from wind -- H.1 Basic theory -- H.l.1 Wind speed and pressure -- H.l.2 Statistical characteristics -- a) Gust spectrum -- b) Aerodynamic admittance function -- c) Spectral density of the wind force -- H.1.3 Dynamic effects -- H.2 Vibrations in along-wind direction induced by gusts -- H.2.1 Spectral methods -- a) Mechanical amplification function -- b) Spectral density of the system response -- H.2.2 Static equivalent force method based on stochastic loading -- H.2.3 Static equivalent force method based on deterministic loading -- H.2.4 Remedial measures -- H.3 Vibrations in along-wind direction induced by buffeting -- H.4 Vibrations in across-wind direction induced by vortex-shedding -- H.4.1 Single structures -- H.4.2 Several structures one behind another -- H.4.3 Conical structures -- H.4.4 Vibrations of shells -- H.5 Vibrations in across-wind direction: Galloping -- H.6 Vibrations in across-wind direction: flutter -- H.7 Damping of high and slender RC structures subjected to wind -- I Human response to vibrations -- I.1 Introduction -- I.2 Codes of practice -- I.2.1 ISO 2631 -- I.2.2 DIN 4150/2 -- J Building response to vibrations -- J.1 General -- J.2 Examples of recommended limit values -- References to the Appendices -- List of Codes and Standards.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  10. 142550

    Engineering decision making and risk management by Herrmann, Jeffrey W.

    Hoboken, New Jersey : Wiley, 2015
    Table of Contents: “…Multicriteria Decision Making 3.1 Pugh Concept Selection Method 3.2 Analytic Hierarchy Process (AHP) 3.3 Multiattribute Utility Theory (MAUT) 3.4 Conjoint Analysis 3.5 Value of a Statistical Life 3.6 Compensation 3.7 The Impact of Changing Weights Exercises References 4. Group Decision Making 4.1 Ranking 4.2 Scoring and Majority Judgment 4.3 Arrow's Impossibility Theorem Exercises References 5. …”
    Format: Electronic eBook
    Access E-Book
  11. 142551

    Web Information Systems and Applications 19th International Conference, WISA 2022, Dalian, China, September 16–18, 2022, Proceedings

    Cham : Springer International Publishing : Imprint: Springer, 2022
    1st ed. 2022.
    Table of Contents: “…Knowledge Graph -- Temporal Knowledge Graph Embedding for Link Prediction -- A Multi-modal Knowledge Graph Platform Based on Medical Data Lake -- Fusion of Natural Language and Knowledge Graph for Multi-hop Reasoning -- Commonsense Knowledge Construction with Concept and Pretrained Model -- Simplifying Knowledge-aware Aggregation for Knowledge Graph Collaborative Filtering -- Bi-directional Neighborhood-Aware Network for Entity Alignment in Knowledge Graphs -- SAREM: Semi-supervised Active Heterogeneous Entity Matching Framework -- LocRDF: An Ontology-Aware Key-Value Store For Massive RDF Data -- Multi-view based Entity Frequency-aware Graph Neural Network for Temporal Knowledge Graph Link Prediction -- Semantic Reasoning Technology on Temporal Knowledge Graph -- Multiple-granularity Graph for Document-level Relation Extraction -- A Fine-Grained Anomaly Detection Method Fusing Isolation Forest and Knowledge Graph Reasoning -- Design of trademark recommendation system based on knowledge graph -- Natural Language Processing -- An integrated Chinese malicious webpages detection method based on pre-trained language models and feature fusion -- Code comments generation with data flow-guided Transformer -- Coreference Resolution with Syntax and Semantics -- Self-adaptive Context Reasoning Mechanism for Text Sentiment Analysis -- AOED: Generating SQL with the Aggregation Operator Enhanced Decoding -- Multi-Granularity Chinese Text Matching Model Combined With Bidirectional Attention -- World Wide Web -- Data Fusion Methods with Graded Relevance Judgment -- Highway Accident Localization Based on Virtual Fence for Intelligent Transportation Systems -- Design and Implementation of Analyzer Management System Based on Elasticsearch -- A Hybrid Model for Spatio-Temporal Information Recognition in COVID-19 Trajectory Text -- A Research on the Theory and Technology of Trusted Transaction in Modern Service Industry -- Causal Effect Estimation Using Variational Information Bottleneck -- Fault Diagnosis of Web Services Based on Feature Selection -- The Change of Code Metrics for Predicting the Label Change on Evolutionary Projects: An Empirical Study -- Identifying influential spreaders in complex networks based on degree centrality -- Machine Learning -- A knowledge-guided method for disease prediction based on attention mechanism -- Machine Reading Comprehension Based On Hybrid Attention And Controlled Generation -- Contextual Policy Transfer in Meta-Reinforcement Learning via Active Learning -- Emotion Cause Pair Extraction based on Multitask -- Dynamic Alternative Attention for Visual Question Answering -- A Biomedical Trigger Word Identification Method Based on BERT and CRF -- Tackling Non-stationarity in Decentralized Multi-Agent Reinforcement Learning with Prudent Q-Learning -- Deep multi-mode learning for book spine recognition -- DEAR: Dual-level Self-Attention GRU for Online Early Prediction of Sepsis -- A Route Planning Method of UAV Based on Multiaircraft Cooperation -- An Improved Monte Carlo Denoising Algorithm Based on Kernel-Predicting Convolutional Network -- Research on target detection method based on improved YOLOv5 -- Diagnostic Prediction for Cervical Spondylotic Myelopathy Based on Multi-source Data in Electronic Medical Records -- Query Processing and Algorithm -- Weighted Cost Model for Optimized Query Processing -- A Data Dimensionality Reduction Method Based on mRMR and Genetic Algorithm for High-dimensional Small Sample Data -- Efficient Subhypergraph Containment Queries on Hypergraph Databases -- Logistics Distribution Route Optimization using Hybrid Ant Colony Optimization Algorithm -- Recommendation -- Multi-Preference Book Recommendation Method Based on Graph Convolution Neural Network -- Sentiment-aware Neural Recommendation with Opinion-based Explanations -- Dual-level Hypergraph Representation Learning for Group Recommendation -- GeoGTI: Towards A General, Transferable and Interpretable Site Recommendation -- LFM-C: A Friend Recommendation Algorithm for Campus Mutual Aid System -- Recommending Online Course Resources Based on Knowledge Graph -- Data Privacy and Security -- Multi-party Privacy-Preserving Record Linkage Method Based on Trusted Execution Environment -- Efficient Differential Privacy Federated Learning Mechanism for Intelligent Selection of Optimal Privacy Protection Levels -- Patient-Friendly Medical Data Security Sharing Scheme Based on Blockchain and Proxy Re-Encryption -- Spatial Data Publication Under Local Differential Privacy -- Big Data Analysis for Anti-Money Laundering: a Case of Open Source Greenplum Application -- Blockchain -- Efficient Multi-Party Privacy-Preserving Record Linkage Based On Blockchain -- A Blockchain-based Scheme for Efficient Medical Data Sharing with Attribute-based Hierarchical Encryption -- B-Store, a general block storage and retrieval system for blockchain -- Enabling Verifiable Single-Attribute Range Queries on Erasure-Coded Sharding-Based Blockchain Systems -- An Efficient Query Architecture for Permissioned Blockchain -- MCQL: A Multi-node Consortium Blockchain Query Method Based on Node Dynamic Adjustment -- An Ethereum-based Image Copyright Authentication Scheme -- Modifiable Blockchain Based on Chebyshev Polynomial and Chameleon Hash Function.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  12. 142552

    Big Data Analytics Proceedings of CSI 2015

    Singapore : Springer Singapore : Imprint: Springer, 2018
    Table of Contents: “…Title of the Papers along with the Name of the Authors -- Need for Developing Intelligent Interfaces for Big Data Analytics in the Micro Finance Industry -- Unified Resource Descriptor over KAAS Framework Refining Cloud Dynamics -- An Adoptable and Secure Intelligent Smart Card Framework for Internet of Things and Cloud Computing -- A Framework for Ontology Learning from Taxonomic Data -- Leveraging Map-Reduce with Column Oriented Stores: Study of Solutions and Benefits -- Hadoop: Solution to Unstructured Data Handling -- Task Based Load Balancing Algorithm by Efficient Utilization of VMs in Cloud Computing -- A Load Balancing Algorithm Based on Processing Capacities of VMs in Cloud Computing -- Package Based Approach for Load Balancing in Cloud Computing -- Workload Prediction of e-Business Websites on Cloud Using Different Methods of ANN -- Data Security in Cloud Based Analytics -- Ontology Based Ranking in Search Engine -- Hidden Data extraction Using URL Templates Processing -- Automatic Generation of Ontology for Extracting Hidden Web Pages -- Importance of SLA in Cloud Computing -- A Survey on Cloud Computing -- Adapting & Reducing Cost in Cloud Paradigm (ARCCP) -- Power Aware Based Workflow Model of Grid Computing Using Ant Based Heuristic Approach -- Image Categorization Using Improved Data Mining Technique -- An Effective Hybrid Encryption Algorithm for Ensuring Cloud Data Security -- Big Data Analytics: Recent and Emerging Application in Services Industry -- An Analysis of Resource Aware Adaptive Scheduling for HPC Clusters with Hadoop -- Analytical and Perspective Approach of Big Data in Cloud Computing -- Implementation of CouchDB Views -- Evolution of FOAF and SIOC in Semantic Web: A Survey -- Classification of e-Commerce Products Using Rep-Tree And K-Mean Hybrid Approach -- A Study of Factors Affecting MapReduce Scheduling -- Outlier Detection in Agriculture Domain: Application and Techniques -- A Framework for Twitter Data Analysis -- Web Structure Mining Algorithms: A Survey -- Big Data Analytics via IoT with Cloud Service -- A Proposed Contextual Model for Big Data Analysis Using Advanced Analytics -- Ranked Search over Encrypted Cloud Data in Azure Using Secure kNN -- DCI3 Model for Privacy Preserving in Big Data -- Study of Sentiment Analysis Using Hadoop -- OPTIMA(OPinionated Tweet Implied Mining and Analysis) - An Innovative Tool to Automate Sentiment Analysis -- Mobile Agent Based MapReduce Framework for Big Data Processing -- Review of Parallel Apriori Algorithm on Map Reduce Framework for Performance Enhancement -- A Novel Approach to Realize Internet of Intelligent Things -- An Innovative Approach of Web Page Ranking Using Hadoop and MapReduce Based Cloud Framework -- SAASQUAL: A Quality Model for Evaluating SaaS on the Cloud Computing Environment -- Scalable Aspect Based Summarization in the Hadoop Environment -- Parallel Mining of Frequent Itemsets from Memory Mapped Files -- Handling Smurfing Through Big Data -- A Novel Approach for Semantic Prefetching Using Semantic Information and Semantic Association -- Optimized Cost Model with Optimal Resource Usage for Cloud -- Understanding Live Migration Techniques Intended for Resource Interference Minimization in Virtualized Cloud Environment -- Cloud Security Issues and Challenges -- A Novel Approach to Protect Cloud Environments Against DDOS Attacks -- An Approach for Workflow Scheduling in Cloud Using ACO -- Data Type Identification and Extension Validator Framework Model for Public Cloud Storage -- Robust Fuzzy Neuro System for Big Data Analytics -- Deployment of Cloud Using Open Source Virtualization: Study of VM Migration Methods and Benefits -- Implementation of Category-wise Focused Web Crawler -- MAYA: An Approach for Energy and Cost Optimization for Mobile Cloud Computing Environments -- Load Balancing in Cloud – A Systematic Review -- Cloud-Based Big Data Analytics – A Survey of Current Research and Future Directions -- Fully Homomorphic Encryption Scheme with Probabilistic Encryption Based on Euler’s Theorem and Application in Cloud Computing -- Big Data: Issues, Challenges and Techniques in Business Intelligence -- Cloud Computing in Bioinformatics and Big Data Analytics: Current Status and Future Research -- Generalized Query Processing Mechanism in CDBMS -- Deliberative Study of Security Issues in Cloud Computing -- Green Cloud Computing: An Overview -- Literature Review of QoS with Load Balancing in Cloud Computing Environment -- WAMLB: Weighted Active Monitoring Load Balancing in Cloud Computing -- Applications of Attribute Based Encryption in Cloud Computing Environment -- Query Optimization: Issues and Challenges in Mining of Distributed Data -- Comprehensive Study of Cloud Computing and Related Security Issues -- Healthcare Data Analysis Using R and MongoDB -- Data Mining Tools and Techniques for Mining Software Repositories: A Systematic Review -- SWOT Analysis of Cloud Computing Environment -- A Review on Quality of Service in Cloud Computing -- Association Rule Mining for Finding Admission Tendency of Engineering Student with Pattern Growth Appraoch -- Integrated Effect of Nearest Neighbors and Distance Measures in k-NN Algorithm.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  13. 142553

    Functional Equations in Mathematical Analysis by Rassias, Themistocles M., 1951-

    New York, NY : Springer New York : Imprint: Springer, 2012
    Table of Contents: “…Kokolakis) -- 36. Generalized weighted arithmetic means (J. Matkowski) -- 37. On means which are quasi-arithmetic and of the Beckenbach-Gini type (J. …”
    Format: Electronic eBook
    Full text (Wentworth users only).
  14. 142554

    Data Mining Algorithms : Explained Using R. by Cichosz, Pawel

    Hoboken : Wiley, 2014
    Table of Contents: “…3.3.1 Algorithm outline3.3.2 Class distribution calculation; 3.3.3 Class label assignment; 3.3.4 Stop criteria; 3.3.5 Split selection; 3.3.6 Split application; 3.3.7 Complete process; 3.4 Pruning; 3.4.1 Pruning operators; 3.4.2 Pruning criterion; 3.4.3 Pruning control strategy; 3.4.4 Conversion to rule sets; 3.5 Prediction; 3.5.1 Class label prediction; 3.5.2 Class probability prediction; 3.6 Weighted instances; 3.7 Missing value handling; 3.7.1 Fractional instances; 3.7.2 Surrogate splits; 3.8 Conclusion; 3.9 Further readings; References; Chapter 4 Naïve Bayes classifier; 4.1 Introduction.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  15. 142555

    Environmental Management and Sustainability in India Case Studies from West Bengal

    Cham : Springer International Publishing : Imprint: Springer, 2023
    1st ed. 2023.
    Table of Contents: “…Identification of Groundwater Potential Zones (GWPZ) using Weighted Overlay Model: case study on a semi arid district of West Bengal, India -- Chapter14. …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  16. 142556

    Advanced Machine Learning Technologies and Applications First International Conference, AMLTA 2012, Cairo, Egypt, December 8-10, 2012. Proceedings by Hassanien, Aboul Ella

    Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012
    Table of Contents: “…Part I: Rough Sets and Applications -- Rough Sets-Based Machine Learning over Non-deterministic Data: A Brief Survey -- A Role of (Not) Crisp Discernibility in Rough Set Approach to Numeric Feature Selection -- Learning a Table from a Table with Non-deterministic Information: A Perspective -- Parameterised Fuzzy Petri Nets for Approximate Reasoning in Decision Support Systems -- New Method for Finding Rules in Incomplete and Distributed Information Systems Controlled by Reducts -- Rough Sets-Based Rules Generation Approach: A Hepatitis C Virus Data Sets -- Mammogram Segmentation Using Rough k-Means and Mass Lesion Classification with Artificial Neural Network -- Part II: Machine Learning in Pattern Recognition and Image Processing Automatic Color Image Segmentation Based on Illumination Invariant and Superpixelization -- CBARS: Cluster Based Classification for Activity Recognition Systems -- Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces -- Solving Avatar Captchas Automatically -- Comparative Analysis of Image Fusion Techniques in Remote Sensing -- Density Based Fuzzy Thresholding for Image Segmentation -- Subjectivity and Sentiment Analysis of Arabic: A Survey -- Part III: Machine Learning in Multimedia Computing -- Support Vector Machine Approach for Detecting Events in Video Streams -- Study of Feature Categories for Musical Instrument Recognition -- Towards a Characterization of Musical Timbre Based on Chroma Contours -- Augmenting Interaction Possibilities between People with Mobility Impairments and Their Surrounding Environment -- A Genetic-CBR Approach for Cross-Document Relationship Identification -- Improved Action Recognition Using an Efficient Boosting Method -- Towards Smart Egypt –The Role of Large Scale WSNs -- Arabic Sign Language Recognition System Based on Adaptive Pulse-Coupled Neural Network -- Surface Mining Signal Discrimination Using Landsat TM Sensor: An Empirical Approach -- Design Space Exploration for High Availability drFPGA Based Embedded Systems -- Part IV: Bioinformatics and Cheminformatics -- Trends and Applications -- LWDOSM: Language for Writing Descriptors of Outline Shape of Molecules -- Web Service Based Approach for Viral Hepatitis Ontology Sharing and Diagnosing -- Analysis of Scintigraphic Renal Dynamic Studies: An Image Processing Tool for the Clinician and Researcher -- Combining Multiple Individual Clusterings of Chemical Structures Using Cluster-Based Similarity Partitioning Algorithm -- SampleBoost for Capsule Endoscopy Categorization and Abnormality Detection -- Advanced Parallel Genetic Algorithm with Gene Matrix for Global Optimization -- Combining Multiple K-Means Clusterings of Chemical Structures Using Cluster-Based Similarity Partitioning Algorithm -- Part V: Data Classification and Clustering Theory and Applications -- Soft Flexible Overlapping Biclustering Utilizing Hybrid Search Strategies -- Semi-possibilistic Biclustering Applied to Discrete and Continuous Data -- A Comparative Study of Localization Algorithms in WSNs -- Sentiment Classification Using Graph Based Word Sense Disambigution -- Test Cases Automatic Generator (TCAG): A Prototype -- Support Vector Machines with Weighted Powered Kernels for Data Classification -- Named Entity Based Document Similarity with SVM-Based Re-ranking for Entity Linking -- Part VI: Cloud Computing and Recommender Systems Cloud Model—A Bidirectional Cognition Model between Concept’s Extension and Intension -- An Enhanced Cloud-Based View Materialization Approach for Peer-to-Peer Architecture -- An Enhanced Resource Allocation Approach for Optimizing Sub Query on Cloud -- Food Recommendation Using Ontology and Heuristics -- A Population Based Feature Subset Selection Algorithm Guided by Fuzzy Feature Dependency -- Adapting Voting Techniques for Online Forum Thread Retrieval -- On the Use of Data Mining Techniques in Vehicular Ad Hoc Network.…”
    Format: Electronic eBook
    Full text (Wentworth users only).
  17. 142557

    Wind energy design by Corke, Thomas C., Nelson, Robert C., 1942-

    Boca Raton : Taylor & Francis, CRC Press, 2018
    Table of Contents: “…Note continued: 4.2.Momentum Theory with Wake Rotation -- 4.3.Blade Element Momentum (BEM) Theory -- 4.4.Prandtl's Tip Loss Factor -- 4.5.Solution of the BEM Equations -- 4.5.1.Example BEM Equation Solution -- 5.Horizontal Wind Turbine Rotor Design -- 5.1.Designing a New wind Turbine -- 5.2.Initial Blade Sizing -- 5.2.1.Example Rotor Design -- 6.Wind Turbine Control -- 6.1.Aerodynamic Torque Control -- 6.1.1.Electrical Torque Control -- 6.2.Wind Turbine Operation Strategy -- 6.2.1.Fixed Speed Designs -- 6.2.2.Variable Speed Designs -- 6.2.3.Variable Speed Adaptive Torque Control -- 6.3.Axial Induction Control -- 7.Structural Design -- 7.1.Rotor Response to Loads -- 7.2.Rotor Vibration Modes -- 7.3.Design for Extreme Conditions -- 8.Wind Farms -- 8.1.Wind Turbine Wake Effects -- 8.2.Wind Farm Design Optimization -- 9.Wind Turbine Acoustics -- 9.1.Acoustics Fundamentals -- 9.2.Sound Pressure Measurement and Weighting -- 9.3.dB Math -- 9.4.Low Frequency and Infrasound…”
    Format: Electronic eBook
    Full text (WIT users only)
  18. 142558

    Python Deep Learning. by Zocca, Valentino

    Packt Publishing, 2017
    Table of Contents: “…-- Real-world applications of anomaly detection -- Popular shallow machine learning techniques -- Data modeling -- Detection modeling -- Anomaly detection using deep auto-encoders -- H2O -- Getting started with H2O -- Examples -- MNIST digit anomaly recognition -- Electrocardiogram pulse detection -- Summary -- Chapter 10: Building a Production-ready Intrusion Detection System -- What is a data product? -- Training -- Weights initialization -- Parallel SGD using HOGWILD! …”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  19. 142559

    Analysis, Applications, and Computations Proceedings of the 13th ISAAC Congress, Ghent, Belgium, 2021

    Cham : Springer International Publishing : Imprint: Birkhäuser, 2023
    1st ed. 2023.
    Table of Contents: “…- Part I Plenary Lecture -- A Review of Univariate and Multivariate Multifractal Analysis Illustrated by the Analysis of Marathon Runners Physiological Data -- Part II Applications of Dynamical Systems Theory in Biology -- Wavefronts in Forward-Backward Parabolic Equations and Applications to Biased Movements -- Bohr-Levitan Almost Periodic and Almost Automorphic Solutions of Equation x' (t) = f(t – 1, x(t – 1)) – f(t, x(t)) -- Periodic Solutions in a Differential Delay Equation Modeling Megakaryopoiesis -- Discrete and Continuous Models of the COVID-19 Pandemic Propagation with a Limited Time Spent in Compartments -- Part III Challenges in STEM Education -- Some Aspects of Usage of Digital Technologies in Mathematics Education -- Teaching of STEM Lectures During the COVID-19 Time -- Extra-Curricular Activities to Promote STEM Learning -- Usage of Online Platforms in Education of Mathematics in Transcarpathia at the Beginning of Quarantine -- The Use of Technologies to Promote Critical Thinking in Pre-service Teachers -- Alarming Changes in Polish Education vs Longlife and Remote Learning -- The Most Common Mathematical Mistakes in the Teaching of Scientific Subjects at Secondary Schools -- Challenges to the Development of Effective Creativity -- Part IV Complex Analysis and Partial Differential Equations -- Universality of the Dirichlet Series in the Complex Plane -- On One Oscillation Problem of Zeroth Approximation of Hierarchical Model for Porous Elastic Plates with Variable Thickness -- Solution of the Kirsch Problem for the Elastic Materials with Voids in the Case of Approximation N = 1 of Vekua’s Theory -- Analysis of BVP for Some Elliptic Systems on a Complex Plane -- Second Order Differential Operators Associated to the Space of Holomorphic Functions -- Constructional Method for a Non-local Boundary and Initial Problem Raised from a Free Boundary Model of Cancer -- Part V Complex Variables and Potential Theory -- A Perturbation Result for a Neumann Problem in a Periodic Domain -- On One Inequality for Non-overlapping Domains -- Schwarz Lemma Type Estimates for Solutions to Nonlinear Beltrami Equation -- On Conditions of Local Lineal Convexity Generalized to Commutative Algebras -- On a Quadrature Formula for the Direct Value of the Double Layer Potential -- Menchov–Trokhimchuk Theorem Generalized for Monogenic Functions in a Three-Dimensional Algebra -- Part VI Constructive Methods in the Theory of Composite and Porous Media -- Monodromy of Pfaffian Equations for Group-Valued Functions on Riemann Surfaces -- Introduction to Neoclassical Theory of Composites -- Analogues the Kolosov-Muskhelishvili Formulas for Isotropic Materials with Double Voids -- Schwarz-Christoffel Mapping and Generalised Modulus of a Quadrilateral -- Dimension Reduction in the Periodicity Cell Problem for Plate Reinforced by a Unidirectional System of Fibers -- Self-Consistent Approximations in the Theory of Composites and Their Limitations -- On Electromagnetic Wave Equations for a Nonhomegenous Microperiodic Medium -- Part VII Generalized Functions and Applications -- A Note on Composition Operators Between Weighted Spaces of Smooth Functions -- 1D Hyperbolic Systems with Nonlinear Boundary Conditions II: Criteria for Finite Time Stability -- 1D Hyperbolic Systems with Nonlinear Boundary Conditions I: .L2-Generalized Solutions -- On Classification of Semigroups Associated to Levy Processes -- Part VIII Harmonic Analysis and Partial Differential Equations -- The Index of Toeplitz Operators on Compact Lie Groups and on Simply Connected Closed 3-Manifolds -- Part IX Partial Differential Equations on Curved Spacetimes -- Lorentzian Spectral Zeta Functions on Asymptotically Minkowski Spacetimes -- Aspects of Non-associative Gauge Theory -- Remarks on Global Smoothing Effect of Solutions to Nonlinear ElasticWave Equations with Viscoelastic Term -- Local and Global Solutions for the Semilinear Proca Equations in the de Sitter Spacetime -- Numerical Simulations of Semilinear Klein–Gordon Equation in the de Sitter Spacetime with Structure-Preserving Scheme -- Part X Recent Progress in Evolution Equations -- Global Small Data Solutions for an Evolution Equation with Structural Damping and Hartree-Type Nonlinearity -- A Note on Continuity of Strongly Singular Calderón-Zygmund Operators in Hardy-Morrey Spaces -- The Asymptotic Estimates of the Solutions to the Linear Damping Models with Spatial Dependent Coefficients -- A Klein-Gordon Model with Time-Dependent Coefficients and a Memory-Type Nonlinearity -- Intrinsic Polynomial Squeezing for Balakrishnan-Taylor Beam Models -- On the Wave-Like Energy Estimates of Klein-Gordon Type Equations with Time Dependent Potential -- Non-Linear Evolution Equations with Non-Local Coefficients and Zero-Neumann Condition: One Dimensional Case -- Nonlinear Perturbed BLMP Equation -- Part XI Wavelet Theory and Its Related Topics -- Holomorphic Curves with Deficiencies and the Uniqueness Problem -- On Some Topics Related to the Gabor Wavelet Transform -- On the Diameters and Radii of the Extended Sierpiński Graphs -- Some Inequalities for Parseval Frames -- p-Adic Time-Frequency Analysis and Its Properties.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  20. 142560

    Service-Oriented Computing 10th International Conference, ICSOC 2012, Shanghai, China, November 12-15, 2012. Proceedings by Liu, Chengfei

    Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012
    Table of Contents: “…-Service Engineering 3 A Service Composition Framework Based on Goal-Oriented Requirements Engineering, Model Checking, and Qualitative Preference Analysis -- WCP-Nets:A Weighted Extension to CP-Nets for Web Service Selection -- WS-Finder:A Framework for Similarity Search of Web Services -- Service Security, Privacy and Personalization -- A Framework for Trusted Services -- Configuring Private Data Management as Access Restrictions: From Design to Enforcement -- Modeling User’s Non-functional Preferences for Personalized Service Ranking.…”
    Format: Electronic eBook
    Full text (Wentworth users only).