Search Results - (( reading mobility in business. ) OR ( learning stability in business. ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Increasing student engagement and retention using mobile applications smartphones, Skype and texting technologies /

    Published 2013
    Table of Contents: “…Embry -- The innovative use of personal smart devices by students to support their learning / Anne Nortcliffe, Andrew Middleton -- Engaging teachers (and students) with media streaming technology : the case of box of broadcasts / Vicki Holmes ... [et al.] -- Business students' learning engagement as a function of reading assigned e-textbooks / Susan Stites-Doe, Patricia E. …”
    Full-text access
    View in OPAC
    e-Book
  2. 2
  3. 3

    Artificial Neural Network Modelling

    Published 2016
    Table of Contents: “…Artificial Neural Networks Applications: An Introduction -- Order in the Black Box: Consistency And Robustness Of Neuron Activation Of Feed Forward Neural Networks And Its Use In Efficient Optimization Of Network Structure -- Artificial Neural Networks as Models of Robustness in Development And Regeneration: Stability of Memory During Morphological Remodeling -- A Structure Optimization Algorithm of Neural Networks For Pattern Learning from Educational Data -- Stochastic Neural Networks for Modelling Random Processes from Observed Data -- Curvelet Interaction with Artificial Neural Networks -- Hybrid Wavelet Neural Network Approaches.…”
    Full-text access
    View in OPAC
    e-Book
  4. 4
  5. 5

    Information Systems Design and Intelligent Applications Proceedings of Third International Conference INDIA 2016, Volume 2 /

    Published 2016
    Table of Contents: “…Tools for Data Visualization in Business Intelligence: Case Study Usingthe Tool Qlikview -- Chapter 32. …”
    Full-text access
    View in OPAC
    e-Book
  6. 6
  7. 7

    Computational Intelligence in Data Mining-Volume 2 Proceedings of the International Conference on CIDM, 5-6 December 2015 /

    Published 2016
    Table of Contents: “…Performance Evaluation of Rule Learning Classifiers in Anomaly Based Intrusion Detection -- Chapter 10. …”
    Full-text access
    View in OPAC
    e-Book
  8. 8

    Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 /

    Published 2017
    Table of Contents: “…An Approach to Design an IoT Service for Business-Domain Specific Web Search -- Chapter 62. …”
    Full-text access
    View in OPAC
    e-Book
  9. 9

    Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications FICTA 2016, Volume 1 /

    Published 2017
    Table of Contents: “…A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC) -- Chapter 48. …”
    Full-text access
    View in OPAC
    e-Book