Search alternatives:
"klight" » "flight" (Expand Search)
"slightly" » "flightly" (Expand Search), "sightly" (Expand Search)
"slight" » "flight" (Expand Search), "sight" (Expand Search)
"wrights" » "wright" (Expand Search), "weights" (Expand Search)
"brighton" » "wrighton" (Expand Search)
"bright" » "wright" (Expand Search)
"brightss" » "wrightss" (Expand Search), "brightness" (Expand Search)
"night" » "eight" (Expand Search)
"klight" » "flight" (Expand Search)
"slightly" » "flightly" (Expand Search), "sightly" (Expand Search)
"slight" » "flight" (Expand Search), "sight" (Expand Search)
"wrights" » "wright" (Expand Search), "weights" (Expand Search)
"brighton" » "wrighton" (Expand Search)
"bright" » "wright" (Expand Search)
"brightss" » "wrightss" (Expand Search), "brightness" (Expand Search)
"night" » "eight" (Expand Search)
-
118221
Statistics for people who (think they) hate statistics
Thousand Oaks, CA : SAGE Publications, Inc., 2014Table of Contents: “…The Ratio Level of Measurement -- In Sum -- Reliability: Doing It Again Until You Get It Right -- Test Scores: Truth or Dare? -- Observed Score = True Score + Error Score -- Different Types of Reliability -- Using the Computer to Calculate Cronbach's Alpha -- What the SPSS Output Means -- How Big Is Big? …”
Fifth edition.
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
118222
Introduction to statistics through resampling methods and R
Hoboken, New Jersey : John Wiley & Sons, Inc., 2013Table of Contents: “…-- 5.5.1 p-Values and Significance Levels -- 5.5.2 Test Assumptions -- 5.5.3 Robustness -- 5.5.4 Power of a Test Procedure -- 5.6 Summary and Review -- Chapter 6: Designing an Experiment or Survey -- 6.1 The Hawthorne Effect -- 6.1.1 Crafting an Experiment -- 6.2 Designing an Experiment or Survey -- 6.2.1 Objectives -- 6.2.2 Sample from the Right Population -- 6.2.3 Coping with Variation -- 6.2.4 Matched Pairs -- 6.2.5 The Experimental Unit -- 6.2.6 Formulate Your Hypotheses -- 6.2.7 What Are You Going to Measure? …”
Second edition.
Format: Electronic eBookFull text (Wentworth users only)
-
118223
The Peru reader : history, culture, politics
Durham : Duke University Press, 2005Table of Contents: “…/ Luis Minaya -- Interview with agay activist / Enrique Bossio -- Adrenaline nights / Carmen Ollé -- Reencounter / Giovanna Pollarolo -- I am the bad girl of the story / María Emilia Cornejo -- Conversation in the cathedral / Mario Vargas Llosa -- Slave / Jaime Bayly -- Aguaruna adventures / Anonymous -- Self-images / Workshop for Social Photography.…”
2nd ed., rev. and expanded.
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
118224
Encyclopedia of Database Systems
New York, NY : Springer New York : Imprint: Springer, 2018Table of Contents: “….NET Remoting -- Absolute Time -- Abstract Versus Concrete Temporal Query Languages -- Abstraction -- Access Control -- Access Control Administration Policies -- Access Control Policy Languages -- Access Path -- ACID Properties -- Active and Real-Time Data Warehousing -- Active Database Coupling Modes -- Active Database Execution Model -- Active Database Knowledge Model -- Active Database Management System Architecture -- Active Database Rulebase -- Active Database, Active Database (Management) System -- Active Storage -- Active XML -- Activity -- Activity Diagrams -- Actors/Agents/Roles -- Adaptive Interfaces -- Adaptive Middleware for Message Queuing Systems -- Adaptive Query Processing -- Adaptive Stream Processing -- ADBMS -- Administration Model for RBAC -- Administration Wizards -- Advanced Information Retrieval Measures -- Aggregation: Expressiveness and Containment -- Aggregation-Based Structured Text Retrieval -- Air Indexes for Spatial Databases -- AJAX -- Allen's Relations -- AMOSQL -- AMS Sketch -- Anchor Text -- Annotation -- Annotation-based Image Retrieval -- Anomaly Detection on Streams -- Anonymity -- ANSI/INCITS RBAC Standard -- Answering Queries Using Views -- Anti-monotone Constraints -- Applicability Period -- Application Benchmark -- Application Recovery -- Application Server -- Application-Level Tuning -- Applications of Emerging Patterns for Microarray Gene Expression Data Analysis -- Applications of Sensor Network Data Management -- Approximate Queries in Peer-to-Peer Systems -- Approximate Query Processing -- Approximate Reasoning -- Approximation of Frequent Itemsets -- Apriori Property and Breadth-First Search Algorithms -- Architecture-Conscious Database System -- Archiving Experimental Data -- Armstrong Axioms -- Array Databases -- Array Databases_old -- Association Rule Mining on Streams -- Association Rules -- Asymmetric Encryption -- Atelic Data -- Atomic Event -- Atomicity -- Audio -- Audio Classification -- Audio Content Analysis -- Audio Metadata -- Audio Representation -- Audio Segmentation -- Auditing and Forensic Analysis -- Authentication -- Automatic Image Annotation -- Autonomous Replication -- Average Precision -- Average Precision at n -- Average Precision Histogram -- Average R-Precision -- B+-Tree -- Backup and Restore -- Bag Semantics -- Bagging -- Bayesian Classification -- Benchmark Frameworks -- Benchmarks for Big Data Analytics -- Big Data Platforms for Data Analytics -- Big Stream Systems -- Biological Metadata Management -- Biological Networks -- Biological Resource Discovery -- Biological Sequences -- Biomedical Data/Content Acquisition, Curation -- Biomedical Image Data Types and Processing -- Biomedical Scientific Textual Data Types and Processing -- Biostatistics and Data Analysis -- Bi-Temporal Indexing -- Bitemporal Interval -- Bitemporal Relation -- Bitmap Index -- Bitmap-based Index Structures -- Blind Signatures -- Bloom Filters -- BM25 -- Boolean Model -- Boosting -- Bootstrap -- Boyce-Codd Normal Form -- BP-Completeness -- Bpref -- Browsing -- Browsing in Digital Libraries -- B-Tree Locking -- Buffer Management -- Buffer Manager -- Buffer Pool -- Business Intelligence -- Business Process Execution Language -- Business Process Management -- Business Process Modeling Notation -- Business Process Reengineering -- Cache-Conscious Query Processing -- Calendar -- Calendric System -- CAP Theorem -- Cardinal Direction Relationships -- Cartesian Product -- Cataloging in Digital Libraries -- Causal Consistency -- Certain (and Possible) Answers -- Change Detection on Streams -- Channel-Based Publish/Subscribe -- Chart -- Chase -- Checksum and Cyclic Redundancy Check Mechanism -- Choreography -- Chronon -- Citation -- Classification -- Classification by Association Rule Analysis -- Classification in Streams -- Client-Server Architecture -- Clinical Data Acquisition, Storage and Management -- Clinical Data and Information Models -- Clinical Data Quality and Validation -- Clinical Decision Support -- Clinical Document Architecture -- Clinical Event -- Clinical Knowledge Repository -- Clinical Observation -- Clinical Ontologies -- Clinical Order -- Closed Itemset Mining and Non-redundant Association Rule Mining -- Closest-Pair Query -- Cloud Computing -- Cloud Intelligence -- Cluster and Distance Measure -- Clustering for Post Hoc Information Retrieval -- Clustering on Streams -- Clustering Overview and Applications -- Clustering Validity -- Clustering with Constraints -- Collaborative Filtering -- Column Segmentation -- Column Stores -- Common Warehouse Metamodel -- Comparative Visualization -- Compensating Transactions -- Complex Event -- Complex Event Processing -- Composed Services and WS-BPEL -- Composite Event -- Composition -- Comprehensions -- Compression of Mobile Location Data -- Computational Media Aesthetics -- Computationally Complete Relational Query Languages -- Computerized Physician Order Entry -- Conceptual Modeling Foundations -- Conceptual Schema Design -- Concurrency Control - Traditional Approaches -- Concurrency Control for Replicated Databases -- Concurrency Control Manager -- Conditional Tables -- Conjunctive Query -- Connection -- Consistency Models For Replicated Data -- Consistent Query Answering -- Constraint Databases -- Constraint Query Languages -- Constraint-Driven Database Repair -- Content-and-Structure Query -- Content-Based Publish/Subscribe -- Content-Based Video Retrieval -- Content-Only Query -- Context -- Contextualization in Structured Text Retrieval -- Continuous Data Protection -- Continuous Monitoring of Spatial Queries -- Continuous Multimedia Data Retrieval -- Continuous Queries in Sensor Networks -- Continuous Query -- ConTract -- Control Data -- Convertible Constraints -- Coordination -- Copyright Issues in Databases -- CORBA -- Correctness Criteria Beyond Serializability -- Cost and quality trade-offs in crowdsourcing -- Cost Estimation -- Count-Min Sketch -- Coupling and De-coupling -- Covering Index -- Crash Recovery -- Cross-Language Mining and Retrieval -- Cross-Modal Multimedia Information Retrieval -- Cross-Validation -- Crowd Database Operators -- Crowd Database Systems -- Crowd Mining and Analysis -- Crowdsourcing Geographic Information Systems -- Cube -- Cube Implementations -- Current Semantics -- Curse of Dimensionality -- Daplex -- Data Acquisition and Dissemination in Sensor Networks -- Data Aggregation in Sensor Networks -- Data Broadcasting, Caching and Replication in Mobile Computing -- Data Cleaning -- Data Compression in Sensor Networks -- Data Conflicts -- Data Definition -- Data Definition Language (DDL) -- Data Dictionary -- Data Encryption -- Data Estimation in Sensor Networks -- Data Exchange -- Data Fusion -- Data Fusion in Sensor Networks -- Data Generation -- Data Governance -- Data Integration Architectures and Methodology for the Life Sciences -- Data Integration in Web Data Extraction System -- Data Management for VANETs -- Data Management Fundamentals: Database Management System -- Data Management in Data Centers -- Data Manipulation -- Data Manipulation Language (DML) -- Data Mart -- Data Migration Management -- Data Mining -- Data Partitioning -- Data Privacy and Patient Consent -- Data Profiling -- Data Provenance -- Data Quality Assessment -- Data Quality Dimensions -- Data Quality Models -- Data Rank/Swapping -- Data Reduction -- Data Replication -- Data Sampling -- Data Scrubbing -- Data Sketch/Synopsis -- Data Skew -- Data Storage and Indexing in Sensor Networks -- Data Stream -- Data Stream Management Architectures and Prototypes -- Data Types in Scientific Data Management -- Data Uncertainty Management in Sensor Networks -- Data Visualization -- Data Warehouse -- Data Warehouse Life-Cycle and Design -- Data Warehouse Maintenance, Evolution and Versioning -- Data Warehouse Metadata -- Data Warehouse Security -- Data Warehousing for Clinical Research -- Data Warehousing in Cloud Environments -- Data Warehousing on Non-Conventional Data -- Data Warehousing Systems: Foundations and Architectures -- Data, Text, and Web Mining in Healthcare -- Database -- Database Adapter and Connector -- Database Administrator (DBA) -- Database Appliances -- Database Benchmarks -- Database Clustering Methods -- Database Clusters -- Database Dependencies -- Database Design -- Database Languages for Sensor Networks -- Database Machine -- Database Management System -- Database Middleware -- Database Repair -- Database Reverse Engineering -- Database Schema -- Database Security -- Database System -- Database Techniques to Improve Scientific Simulations -- Database Trigger -- Database Tuning using Combinatorial Search -- Database Tuning using Online Algorithms -- Database Tuning using Trade-off Elimination -- Database Use in Science Applications -- Datalog -- DBMS Component -- DBMS Interface -- DCE -- DCOM -- Decay Models -- Decision Rule Mining in Rough Set Theory -- Decision Tree Classification -- Decision Trees -- Declarative Networking -- Deductive Data Mining using Granular Computing -- Deduplication -- Deduplication in Data Cleaning -- Deep Instantiation -- Deep-Web Search -- Dense Index -- Dense Pixel Displays -- Density-based Clustering -- Description Logics -- Design for Data Quality -- Dewey Decimal System -- Diagram -- Difference -- Differential Privacy -- Digital Archives and Preservation -- Digital Curation -- Digital Elevation Models -- Digital Libraries -- Digital Rights Management -- Digital Signatures -- Dimension -- Dimension Reduction Techniques for Clustering -- Dimensionality Reduction -- Dimensionality Reduction Techniques For Nearest Neighbor Computations -- Dimension-Extended Topological Relationships -- Direct Attached Storage -- Direct Manipulation -- Disaster Recovery -- Disclosure Risk -- Discounted Cumulated Gain -- Discovery -- Discrete Wavelet Transform and Wavelet Synopses -- Discretionary Access Control -- Disk -- Disk Power Saving -- Distortion Techniques -.…”
Second Edition.
Format: Electronic eBookFull text (Wentworth users only)
-
118225
Handbook of social work in health and aging
Oxford ; New York : Oxford University Press, 2006Table of Contents: “…Rafferty -- Policies to protect the rights of older adults / Joan Davitt.…”
Format: Electronic eBookAccess E-Book
-
118226
The strategies of China's firms : resolving dilemmas
Waltham, MA : Chandos Publishing is an imprint of Elsevier, 2015Table of Contents: “…The problem about violation of consumers rights -- 9.5.2. The impact of consumers problems with D̀̀ouble Eleven ́́shopping experience -- 9.6. …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Access E-Book
Full text (Wentworth users only)
-
118227
Computer networks, policies, and applications
New York : Nova Science Publishers, 2011Table of Contents: “…-- PROPOSALS FOR GOVERNMENT POLICY ON ACCESS TO BROADBAND NETWORKS -- The FCC Broadband Policy Statement -- Internet Consumer Bill of Rights -- Network Neutrality -- ANTITRUST AND UNFAIR METHODS OF COMPETITION LAWS -- REFERENCES -- Chapter 2 BROADBAND INTERNET ACCESS AND THE DIGITAL DIVIDE: FEDERAL ASSISTANCE PROGRAMS* -- ABSTRACT -- BACKGROUND -- Broadband in Rural and Underserved Areas[11] -- Federal Role -- State and Local Broadband Activities -- FEDERAL TELECOMMUNICATIONS DEVELOPMENT PROGRAMS -- The Universal Service Concept and the FCC[47] -- Universal Service and the Telecommunications Act of 1996 -- The Schools and Libraries, and Rural Health Care Programs -- 1. …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
118228
Treasures from UCL
London : UCL Press, 2015Table of Contents: “…An early supporter of women's rights -- Leonora Tyson, ed, An Ariti-Suffrage Alphabet, The Women's Press -- Frederick and Emmeline Pethick Lawrence, eds, Votes for Women newspaper, Vol III -- 53. …”
Format: Electronic eBookFull text (Open Access)
Access E-Book
-
118229
Encyclopedia of Database Systems
New York, NY : Springer New York : Imprint: Springer, 2019Table of Contents: “….NET Remoting -- Absolute Time -- Abstract Versus Concrete Temporal Query Languages -- Abstraction -- Access Control -- Access Control Administration Policies -- Access Control Policy Languages -- Access Path -- ACID Properties -- Active and Real-Time Data Warehousing -- Active Database Coupling Modes -- Active Database Execution Model -- Active Database Knowledge Model -- Active Database Management System Architecture -- Active Database Rulebase -- Active Database, Active Database (Management) System -- Active Storage -- Active XML -- Activity -- Activity Diagrams -- Actors/Agents/Roles -- Adaptive Interfaces -- Adaptive Middleware for Message Queuing Systems -- Adaptive Query Processing -- Adaptive Stream Processing -- ADBMS -- Administration Model for RBAC -- Administration Wizards -- Advanced Information Retrieval Measures -- Aggregation: Expressiveness and Containment -- Aggregation-Based Structured Text Retrieval -- Air Indexes for Spatial Databases -- AJAX -- Allen's Relations -- AMOSQL -- AMS Sketch -- Anchor Text -- Annotation -- Annotation-based Image Retrieval -- Anomaly Detection on Streams -- Anonymity -- ANSI/INCITS RBAC Standard -- Answering Queries Using Views -- Anti-monotone Constraints -- Applicability Period -- Application Benchmark -- Application Recovery -- Application Server -- Application-Level Tuning -- Applications of Emerging Patterns for Microarray Gene Expression Data Analysis -- Applications of Sensor Network Data Management -- Approximate Queries in Peer-to-Peer Systems -- Approximate Query Processing -- Approximate Reasoning -- Approximation of Frequent Itemsets -- Apriori Property and Breadth-First Search Algorithms -- Architecture-Conscious Database System -- Archiving Experimental Data -- Armstrong Axioms -- Array Databases -- Array Databases_old -- Association Rule Mining on Streams -- Association Rules -- Asymmetric Encryption -- Atelic Data -- Atomic Event -- Atomicity -- Audio -- Audio Classification -- Audio Content Analysis -- Audio Metadata -- Audio Representation -- Audio Segmentation -- Auditing and Forensic Analysis -- Authentication -- Automatic Image Annotation -- Autonomous Replication -- Average Precision -- Average Precision at n -- Average Precision Histogram -- Average R-Precision -- B+-Tree -- Backup and Restore -- Bag Semantics -- Bagging -- Bayesian Classification -- Benchmark Frameworks -- Benchmarks for Big Data Analytics -- Big Data Platforms for Data Analytics -- Big Stream Systems -- Biological Metadata Management -- Biological Networks -- Biological Resource Discovery -- Biological Sequences -- Biomedical Data/Content Acquisition, Curation -- Biomedical Image Data Types and Processing -- Biomedical Scientific Textual Data Types and Processing -- Biostatistics and Data Analysis -- Bi-Temporal Indexing -- Bitemporal Interval -- Bitemporal Relation -- Bitmap Index -- Bitmap-based Index Structures -- Blind Signatures -- Bloom Filters -- BM25 -- Boolean Model -- Boosting -- Bootstrap -- Boyce-Codd Normal Form -- BP-Completeness -- Bpref -- Browsing -- Browsing in Digital Libraries -- B-Tree Locking -- Buffer Management -- Buffer Manager -- Buffer Pool -- Business Intelligence -- Business Process Execution Language -- Business Process Management -- Business Process Modeling Notation -- Business Process Reengineering -- Cache-Conscious Query Processing -- Calendar -- Calendric System -- CAP Theorem -- Cardinal Direction Relationships -- Cartesian Product -- Cataloging in Digital Libraries -- Causal Consistency -- Certain (and Possible) Answers -- Change Detection on Streams -- Channel-Based Publish/Subscribe -- Chart -- Chase -- Checksum and Cyclic Redundancy Check Mechanism -- Choreography -- Chronon -- Citation -- Classification -- Classification by Association Rule Analysis -- Classification in Streams -- Client-Server Architecture -- Clinical Data Acquisition, Storage and Management -- Clinical Data and Information Models -- Clinical Data Quality and Validation -- Clinical Decision Support -- Clinical Document Architecture -- Clinical Event -- Clinical Knowledge Repository -- Clinical Observation -- Clinical Ontologies -- Clinical Order -- Closed Itemset Mining and Non-redundant Association Rule Mining -- Closest-Pair Query -- Cloud Computing -- Cloud Intelligence -- Cluster and Distance Measure -- Clustering for Post Hoc Information Retrieval -- Clustering on Streams -- Clustering Overview and Applications -- Clustering Validity -- Clustering with Constraints -- Collaborative Filtering -- Column Segmentation -- Column Stores -- Common Warehouse Metamodel -- Comparative Visualization -- Compensating Transactions -- Complex Event -- Complex Event Processing -- Composed Services and WS-BPEL -- Composite Event -- Composition -- Comprehensions -- Compression of Mobile Location Data -- Computational Media Aesthetics -- Computationally Complete Relational Query Languages -- Computerized Physician Order Entry -- Conceptual Modeling Foundations -- Conceptual Schema Design -- Concurrency Control - Traditional Approaches -- Concurrency Control for Replicated Databases -- Concurrency Control Manager -- Conditional Tables -- Conjunctive Query -- Connection -- Consistency Models For Replicated Data -- Consistent Query Answering -- Constraint Databases -- Constraint Query Languages -- Constraint-Driven Database Repair -- Content-and-Structure Query -- Content-Based Publish/Subscribe -- Content-Based Video Retrieval -- Content-Only Query -- Context -- Contextualization in Structured Text Retrieval -- Continuous Data Protection -- Continuous Monitoring of Spatial Queries -- Continuous Multimedia Data Retrieval -- Continuous Queries in Sensor Networks -- Continuous Query -- ConTract -- Control Data -- Convertible Constraints -- Coordination -- Copyright Issues in Databases -- CORBA -- Correctness Criteria Beyond Serializability -- Cost and quality trade-offs in crowdsourcing -- Cost Estimation -- Count-Min Sketch -- Coupling and De-coupling -- Covering Index -- Crash Recovery -- Cross-Language Mining and Retrieval -- Cross-Modal Multimedia Information Retrieval -- Cross-Validation -- Crowd Database Operators -- Crowd Database Systems -- Crowd Mining and Analysis -- Crowdsourcing Geographic Information Systems -- Cube -- Cube Implementations -- Current Semantics -- Curse of Dimensionality -- Daplex -- Data Acquisition and Dissemination in Sensor Networks -- Data Aggregation in Sensor Networks -- Data Broadcasting, Caching and Replication in Mobile Computing -- Data Cleaning -- Data Compression in Sensor Networks -- Data Conflicts -- Data Definition -- Data Definition Language (DDL) -- Data Dictionary -- Data Encryption -- Data Estimation in Sensor Networks -- Data Exchange -- Data Fusion -- Data Fusion in Sensor Networks -- Data Generation -- Data Governance -- Data Integration Architectures and Methodology for the Life Sciences -- Data Integration in Web Data Extraction System -- Data Management for VANETs -- Data Management Fundamentals: Database Management System -- Data Management in Data Centers -- Data Manipulation -- Data Manipulation Language (DML) -- Data Mart -- Data Migration Management -- Data Mining -- Data Partitioning -- Data Privacy and Patient Consent -- Data Profiling -- Data Provenance -- Data Quality Assessment -- Data Quality Dimensions -- Data Quality Models -- Data Rank/Swapping -- Data Reduction -- Data Replication -- Data Sampling -- Data Scrubbing -- Data Sketch/Synopsis -- Data Skew -- Data Storage and Indexing in Sensor Networks -- Data Stream -- Data Stream Management Architectures and Prototypes -- Data Types in Scientific Data Management -- Data Uncertainty Management in Sensor Networks -- Data Visualization -- Data Warehouse -- Data Warehouse Life-Cycle and Design -- Data Warehouse Maintenance, Evolution and Versioning -- Data Warehouse Metadata -- Data Warehouse Security -- Data Warehousing for Clinical Research -- Data Warehousing in Cloud Environments -- Data Warehousing on Non-Conventional Data -- Data Warehousing Systems: Foundations and Architectures -- Data, Text, and Web Mining in Healthcare -- Database -- Database Adapter and Connector -- Database Administrator (DBA) -- Database Appliances -- Database Benchmarks -- Database Clustering Methods -- Database Clusters -- Database Dependencies -- Database Design -- Database Languages for Sensor Networks -- Database Machine -- Database Management System -- Database Middleware -- Database Repair -- Database Reverse Engineering -- Database Schema -- Database Security -- Database System -- Database Techniques to Improve Scientific Simulations -- Database Trigger -- Database Tuning using Combinatorial Search -- Database Tuning using Online Algorithms -- Database Tuning using Trade-off Elimination -- Database Use in Science Applications -- Datalog -- DBMS Component -- DBMS Interface -- DCE -- DCOM -- Decay Models -- Decision Rule Mining in Rough Set Theory -- Decision Tree Classification -- Decision Trees -- Declarative Networking -- Deductive Data Mining using Granular Computing -- Deduplication -- Deduplication in Data Cleaning -- Deep Instantiation -- Deep-Web Search -- Dense Index -- Dense Pixel Displays -- Density-based Clustering -- Description Logics -- Design for Data Quality -- Dewey Decimal System -- Diagram -- Difference -- Differential Privacy -- Digital Archives and Preservation -- Digital Curation -- Digital Elevation Models -- Digital Libraries -- Digital Rights Management -- Digital Signatures -- Dimension -- Dimension Reduction Techniques for Clustering -- Dimensionality Reduction -- Dimensionality Reduction Techniques For Nearest Neighbor Computations -- Dimension-Extended Topological Relationships -- Direct Attached Storage -- Direct Manipulation -- Disaster Recovery -- Disclosure Risk -- Discounted Cumulated Gain -- Discovery -- Discrete Wavelet Transform and Wavelet Synopses -- Discretionary Access Control -- Disk -- Disk Power Saving -- Distortion Techniques -.…”
Format: Electronic eBookFull text (Wentworth users only)
-
118230
Insect conservation and Australia’s Inland Waters
Cham : Springer International Publishing : Imprint: Springer, 2020Table of Contents: “…Dispersal -- 10.2.1. Impacts of urban lighting -- 10.2.2. Pond colonization -- References -- 11. …”
1st ed. 2020.
Format: Electronic eBookFull text (Wentworth users only)
-
118231
Instrument Procedures Handbook : FAA-H-8083-16B.
Ashland : Aviation Supplies & Academics, Inc., 2017Table of Contents: “…Intro -- Preface -- Acknowledgments -- Notice -- Summary of Changes -- Table of Contents -- Chapter 1: Departure Procedures -- Introduction -- Surface Movement Safety -- Airport Sketches and Diagrams -- Chart Supplements (CS) -- Surface Movement Guidance Control System (SMGCS) -- Advanced Surface Movement Guidance Control System (A-SMGCS) -- Airport Signs, Lighting, and Markings -- Runway Incursions -- Runway Hotspots -- Standardized Taxi Routes -- Taxi and Movement Operations Change -- Weather and the Departure Environment -- Takeoff Minimums -- Takeoff Minimums for Commercial Operators…”
Format: eBookFull text (Emerson users only)
-
118232
The Columbia anthology of gay literature : readings from Western antiquity to the present day
New York : Columbia University Press, 1998Table of Contents: “…Out of the shadow world -- Inventing and enforcing modern homophobia (1933-1969) -- Lighting the shadow world -- pt. 9. Out there -- 29. …”
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
118233
The School for Scandal
New York, N.Y. : Films Media Group, 2014Table of Contents: “…The School for Scandal: Act 1: Scene 1 (19:28) -- The School for Scandal: Act 1: Scene 2 (5:34) -- The School for Scandal: Act 2: Scene 1 (6:05) -- The School for Scandal: Act 2: Scene 2 (11:47) -- The School for Scandal: Act 2: Scene 3 (4:17) -- The School for Scandal: Act 3: Scene 1 (13:06) -- The School for Scandal: Act 3: Scene 2 (2:58) -- The School for Scandal: Act 3: Scene 3 (12:19) -- The School for Scandal: Act 4: Scene 1 (9:25) -- The School for Scandal: Act 4: Scene 2 (1:31) -- The School for Scandal: Act 4: Scene 3 (24:32) -- The School for Scandal: Act 5: Scene 1 (9:05) -- The School for Scandal: Act 5: Scene 2 (11:47) -- The School for Scandal: Act 5: Scene 3 (13:48) -- Curtain Call (0:43) -- Credits: The School for Scandal (0:49) -- Cast Interviews: Director (2:52) -- Cast Interviews: Director II (5:01) -- Cast Interviews: Production & Costume Designer (2:58) -- Cast Interviews: Lighting Designer (4:04) -- Cast Interviews: Lady Sneerwell (6:03) -- Cast Interviews: Sir Peter Teazle (5:51) -- Cast Interviews: Lady Teazle (3:07) -- Cast Interviews: Mrs. …”
Format: Electronic VideoStreaming video (Emerson users only)
Streaming video (Wentworth users only)
-
118234
West African 'ulamā' and Salafism in Mecca and Medina : jawab al-Ifrīqī-the response of the African
Leiden, Netherlands ; Boston [Massachusetts] : Brill, 2015Table of Contents: “…Mahṃūd al-Madanī (Ag Mahṃūd Abdullahi): The "Intransigent" Salafī MissionaryChapter 3 The ʻUlamāʼ of the Second Generation, Heirs of the Hijra and Teachers in the First Islamic Institutes in Saudi Arabia; Hạmmād al-Ansạ̄rī (1344-1418/1925-97); "Rihḷat min Ifrīqyā ilā bilād al-hạramayn" [Traveling from Africa to the two holy cities]; The Ansạ̄r al-Sunna in Sudan; The Legacy of Shaykh Hạmmād al-Ansạ̄rī in West Africa; ʻAbd al-Rahṃān Yūsuf al-Ifrīqī; Al-Anwār al-rahṃāniyya li-hidāyat al-firqa al-Tijāniyya [The divine lights to save the Tijāniyya sect].…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
118235
Building codes illustrated : a guide to understanding the 2015 international building code®
Hoboken, New Jersey : Wiley, 2016Table of Contents: “…Designing for AccessibilityAmericans with Disabilities Act; Definitions; Scoping Requirements; Accessible Routes; Accessible Entrances; Parking and Passenger Loading Facilities; Dwelling Units and Sleeping Units; Special Occupancies; Other Features and Facilities; Signage; Supplementary Accessibility Requirements; 12 Interior Environment; Ventilation; Lighting; Yards or Courts; Sound Transmission; Interior Space Dimensions; Access and Materials; 13 Energy Efficiency; 14 Exterior Walls; Exterior-Wall Envelope; Performance Requirements; Wall Materials; Installation of Wall Coverings.…”
5th ed.
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Access E-Book
Full text (Wentworth users only)
Full text (Wentworth users only)
-
118236
Italian Neorealist Cinema : an Aesthetic Approach.
Toronto : University of Toronto Press, 2008Table of Contents: “…Acknowledgments; Introduction; 1 Overview; The Italian Cinema Industry; The Cultural Context; Films: Production and Screenwriting; The Pro-filmic; The Institution of Neorealism; 2 Realism; Aesthetics; Reference; Narrative; Genre; Idealism; Realism; Cesare Zavattini; Rhetoric; A Note on Comedy; 3 Roma città aperta; Photography; Lighting; Sound; Mise en scène; Performers; Costume; The Narrative: Story and Plot; Dramaturgy: Analysis of the Episode of the Shooting of Pina; Roma città aperta and Neorealism; 4 Paisà; The Rome Episode; The Sicily Episode; The Monastery Episode.…”
2nd ed.
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
118237
Augmented Reality for Developers.
Birmingham : Packt Publishing, 2017Table of Contents: “…Objects and hierarchyScene editing -- Adding a cube -- Adding a plane -- Adding a material -- Saving the scene -- Changing the Scene view -- Game development -- Material textures, lighting, and shaders -- Animation -- Physics -- Additional features -- Using Cameras in AR -- Getting and using Vuforia -- Installing Vuforia -- Downloading the Vuforia Unity package -- Importing the Vuforia Assets package -- VuforiaConfiguration setup -- License key -- Webcam -- Building a quick demo with Vuforia -- Adding AR Camera prefab to the Scene…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
118238
OpenGL Insights.
Hoboken : CRC Press, 2012Table of Contents: “…Massive Number of Shadow-Casting Lights with Layered Rendering; 20. Efficient Layered Fragment Buffer Techniques; 21. …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (WIT users only)
Full text (Wentworth users only)
-
118239
Extending Creativity with Adobe Firefly Create Striking Visuals, Add Text Effects, and Edit Design Elements Faster with Text Prompts
Birmingham : Packt Publishing, Limited, 2024Table of Contents: “…Use case for Content Credentials -- Summary -- Chapter 2: Using the Text to image Module -- Writing effective prompts for image generation -- Generating images using the Text to image module -- Exploring features in Text to image via Adobe Firefly website -- Adjusting Photo settings -- Working with the advanced settings of Adobe Firefly -- Using color and tone effects -- Changing lighting effects -- Adjusting composition -- Advanced editing options within an image -- Extending your work into Adobe Express -- Using the Share Options -- Sharing your generated images via a link…”
1st edition.
Format: Electronic eBookFull text (Wentworth users only)
-
118240
Adobe® Premiere® Pro CS5 Classroom in a Book®
Adobe Press 2011Table of Contents: “…Cover -- Contents -- Getting Started -- About Classroom In A Book -- Prerequisites -- Installing Adobe Premiere Pro Cs5 -- Adobe Premiere Pro Cs5 Trial -- Optimizing Performance -- Copying The Lesson Files -- How To Use These Lessons -- Additional Resources -- Adobe Certification -- Checking For Updates -- 1 Touring Adobe Premiere Pro Cs5 -- Topics Covered In This Lesson -- New Features In Adobe Premiere Pro Cs5 -- Nonlinear Editing In Adobe Premiere Pro Cs5 -- Presenting The Standard Digital Video Workflow -- Enhancing The Workflow With High-Level Features -- Incorporating Other Cs5 Components Into The Editing Workflow -- Adobe Cs5 Production Premium Workflow -- Touring The Adobe Premiere Pro Workspace -- The Workspace Layout -- Customizing The Workspace -- 2 Selecting Settings, Adjusting Preferences, And Managing Assets -- Topics Covered In This Lesson -- Getting Started -- Selecting Project Settings By Sequence -- Three Types Of Settings -- Specifying Project Settings -- Sequence Settings -- Adjusting User Preferences -- Importing Assets -- Taking A Closer Look At Images -- Image Tips -- Managing Media In Bins -- Exploring Additional Bin Features -- Having Multiple Bins Open At Once -- Finding Assets -- Finding Assets With The Media Browser -- 3 Importing And Managing Tapeless Media -- Topics Covered In This Lesson -- Getting Started -- Using A Tapeless Workflow -- Panasonic P2 -- Sony Xdcam -- Avchd -- Digital Still Cameras That Shoot High-Definition Video -- Using The Media Browser -- Importing Xdcam Media -- Importing P2 Media -- P2 Folder Structure -- Importing Avchd Media -- Mixing Media Formats -- 4 Shooting And Capturing Great Video Assets -- Topics Covered In This Lesson -- Getting Started -- Tips For Shooting Great Video -- Get A Closing Shot -- Get An Establishing Shot -- Shoot Plenty Of Video -- Adhere To The Rule Of Thirds -- Keep Your Shots Steady -- Follow The Action -- Use Trucking Shots -- Find Unusual Angles -- Lean Forward Or Backward -- Get Wide And Tight Shots -- Shoot Matched Action -- Get Sequences -- Avoid Fast Pans And Snap Zooms -- Shoot Cutaways -- Use Lights -- Grab Good Sound Bites -- Get Plenty Of Natural Sound -- Plan Your Shoot -- Capturing Video -- Three Dv/Hdv-Capturing Scenarios -- Capturing An Entire Tape -- Using Batch Capture And Scene Detection -- Use A Clip-Naming Convention -- Use Scene Detection -- Tackling Manual Analog Movie Capture -- Capturing Hdv And Hd Video -- 5 Creating Cuts-Only Videos -- Topics Covered In This Lesson -- Getting Started -- Using A Storyboard To Build A Rough Cut -- Arranging Your Storyboard -- Automating Your Storyboard To A Sequence -- Editing Clips On The Timeline -- Trimming A Clip -- Using The Ripple Edit Tool -- Moving Clips To, From, And Within The Timeline -- Using The Current-Time Indicator To Establish The Edit Point.…”
Format: Electronic eBookFull text (Wentworth users only)