Showing 661 - 680 results of 933 for search '(((((rain OR ((tpain OR tmain) OR tmain)) OR (((((((bbtbbbrain OR bbtbbbpain) OR bbtbbrain) OR bbtbbtmain) OR stmain) OR bbttmain) OR (tmain OR ((smain OR (sbbrain OR sbbrain)) OR (tmain OR train)))) OR (((tpain OR tbbrain) OR tbbbbbbbrain) OR ((tpain OR tbbrain) OR tbbbbbbbrain)))) OR (((((amain OR amain) OR ((bmain OR bmain) OR bargain)) OR (((btttbpain OR btttbpain) OR (((btbmain OR btmain) OR btbttbmain) OR btbttbmain)) OR (pain OR pain))) OR (((((bmain OR pain) OR (((smain OR (sbttttbbbbrain OR sbttttrain)) OR ((smain OR smain) OR (stbtmain OR stbbtpain))) OR (smain OR smain))) OR sbbrain) OR (((((((sbbbttttttbpain OR sbbbttttttpain) OR sbbbtttbbbrain) OR (sbbbtbbtttbrain OR ((sbbbtbtbtmain OR sbbbtbtbmain) OR (sbbbrain OR sbbrain)))) OR (sbbbbtbtbrain OR sbbbbtbtbrain)) OR ((sbbbrain OR sbbbbbmain) OR (sbbbbbbbbrain OR sbbbbbmain))) OR (sbbrain OR smain)) OR ((sbbrain OR (sbbrain OR ((sbbtbrain OR sbbtbtmain) OR ((sbbpain OR sbpain) OR sbpain)))) OR sbbrain))) OR sbbrain)) OR gain)) OR (min OR min)) OR (spain OR tpain)) tax', query time: 1.53s Refine Results
  1. 661
  2. 662

    Comprehensive Ruby Programming. by Hudgens, Jordan

    Published 2017
    Table of Contents: “…Implementing a prime number counting algorithm -- How to code the power digit sum algorithm -- Implementing a humanize counting algorithm -- Implementing a date algorithm -- How to code a Fibonacci digit counter -- Implementing a permutation algorithm -- Implementing an amicable number algorithm -- Implementing a factorial algorithm -- Implementing an even Fibonacci number algorithm -- Implementing the least common multiple -- Summary -- Chapter 19: Machine Learning -- Big data analysis -- Basic decision tree implementation -- Addition of attributes -- Addition of training data and its values -- Calling the ID3 method -- Function of the train method -- Addition of the test method -- Setting up decision variables -- Print the results out -- Testing the program -- Advantage of decision trees over if ... else statements -- How to develop a big data analysis application in Ruby -- Summary -- Index.…”
    Full text (Wentworth users only)
    Electronic eBook
  3. 663

    Use Public Tools for Career Success Kaleba, Kermit. by Kaleba, Kermit

    Published 2007
    Full text (Wentworth users only)
    Electronic eBook
  4. 664

    The wages of war : when America's soldiers came home : from Valley Forge to Vietnam / Richard Severo and Lewis Milford. by Severo, Richard, Milford, Lewis

    Published 2016
    Table of Contents: “…Cover Page; Title Page; Dedication; Contents; Series Introduction; Introduction; Prologue; Part One: After the Revolution; 1 Lambs and Bees or Tigers and Wolves; 2 Half Pay, Full Taxes, and Engines of Vice; 3 Officer Princes and the Art of Living Happily Ever After; 4 Daniel Shays: From True Patriot to Counterfeit Public Enemy; 5 A Little Rebellion Now and Then; Part Two: The War of 1812 and the Mexican War; 6 Like Sweet Poison on the Taste; 7 Just Debts and Common Sense; 8 St. …”
    Full text (Wentworth users only)
    Electronic eBook
  5. 665
  6. 666

    Find Grant Funding Now! : the Five-Step Prosperity Process for Entrepreneurs and Business. by Aubrey, Sarah Beth

    Published 2013
    Table of Contents: “…; Grants Are Usually a Reimbursement; Reporting Is Required; Grants Can Be Recalled; A Grant Is Always Competitive; What Grants Are Not; Grants versus Loans; Grants versus Scholarships; Grants versus Rebates; Grants versus Tax Credits.…”
    Full text (Wentworth users only)
    Electronic eBook
  7. 667

    In Search for the Soul of International Business. by Czinkota, Michael R.

    Published 2018
    Full text (Wentworth users only)
    Electronic eBook
  8. 668
  9. 669
  10. 670
  11. 671

    Frequently Asked Questions on IFRS. by Yoxen

    Published 2013
    Full text (Wentworth users only)
    Electronic eBook
  12. 672

    Kickstart Your Corporation Feindel, Andrew. by Feindel, Andrew

    Published 2020
    Full text (Wentworth users only)
    Electronic eBook
  13. 673
  14. 674

    Increasing formality and productivity of Bolivian firms.

    Published 2009
    Full text (Wentworth users only)
    Electronic eBook
  15. 675
  16. 676

    The Darwin Economy Frank, Robert. by Frank, Robert

    Published 2011
    Full text (Wentworth users only)
    Electronic eBook
  17. 677

    Edge Computing and IoT: Systems, Management and Security Third EAI International Conference, ICECI 2022, Virtual Event, December 13-14, 2022, Proceedings / edited by Zhu Xiao, Ping...

    Published 2023
    Table of Contents: “…Models and methods for data management in IoT -- Forecasting the Temperature of BEV Battery Pack based on Field Testing Data -- The Data Exchange Protocol over Multi-chain BlockchainUsing Zero-knowledge Proof -- A Hybrid Task Offloading and Service Cache Scheme for Vehicular Edge Computing -- On Enhancing Transmission Performance for IoV Based on Improved Greedy Algorithm -- Precise Segmentation on Poly-Yolo, YoloV5 and FCN -- Adaptive approaches to manage energy consumption and security of systems -- Research on DAG Based Consensus Mechanism for Adjustable Load Metering Data -- A Detection and Information Processing Model based on an Automatic Mechanism for Tax Payment Control in Developing Countries -- IEC-FOF: An Industrial Electricity Consumption Forecasting and Optimization Framework -- Demons Hidden in the Light: Unrestricted Adversarial Illumination Attacks -- Edge Intelligence Based Garbage Classification Detection Method -- Mobile computing in wireless networks -- Evaluation of Higher Education System -- Defense Mechanisms against Audio Adversarial Attacks: Recent Advances and Future Directions -- An Empirical Study of Worldwide Plastic Waste Mitigation -- Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence -- Highly Accurate Dynamic Gesture Recognition Method Based on Edge Intelligence -- Distributed computing in IOT -- Edge Intelligence Based Garbage Classification Detection Method -- Adversarial Example Attacks in Internet of Things (IoT) -- Training Node Screening in Decentralized Trusted Federated Learning -- Exploration and Practice of Course Homework Metaverse Based on Extended Reality under Edge Computing -- Federated Learning Based User Scheduling for Real-Time Multimedia Tasks in Edge Devices -- A Co-caching Strategy for Edges Based on Federated Learning and Regional Prevalence -- LSTM-DAM: Malicious Network Traffic Prediction for Cloud Manufacturing System.…”
    Full text (Wentworth users only)
    Electronic eBook
  18. 678
  19. 679

    Breaking the sound barrier / Amy Goodman ; edited by Denis Moynihan. by Goodman, Amy, 1957-

    Published 2009
    Table of Contents: “…Obama strikes a chord with a disaffected Republican -- It's not the man, it's the movement -- Change big donors can believe in -- Organizer in chief -- President Obama can redeem the White House -- Chevron in the White House -- A long train ride.…”
    Full text (Wentworth users only)
    Electronic eBook
  20. 680