Search Results - ("algorithm" OR "algorithms")
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 250
- Mathematical models 220
- Mathematics 191
- Algorithms 134
- Artificial intelligence 127
- algorithms 122
- Machine learning 119
- Computer algorithms 93
- methods 85
- artificial intelligence 82
- Mathematical optimization 79
- Data mining 78
- Computer networks 65
- Digital techniques 62
- Diseases 59
- Signal processing 58
- Technological innovations 58
- Computer simulation 56
- Research 56
- Computer science 53
- Artificial Intelligence 50
- Social aspects 49
- Statistical methods 48
- Image processing 47
- Information technology 45
- Security measures 44
- Bioinformatics 42
- Data Mining 42
- Numerical analysis 42
- Wireless communication systems 42
-
141
C# Data Structures and Algorithms : Explore the possibilities of C# for developing a variety of efficient applications.
Published 2018Table of Contents: “…Prim's algorithmExample -- telecommunication cable; Coloring; Example -- voivodeship map; Shortest path; Example -- game map; Summary; Chapter 7: Summary; Classification of data structures; Diversity of applications; Arrays; Lists; Stacks; Queues; Dictionaries; Sets; Trees; Heaps; Graphs; The last word; Other Books You May Enjoy; Index.…”
Full text (MFA users only)
Electronic eBook -
142
Algorithmic Diagnosis of Symptoms and Signs.
Published 2017Table of Contents: “…Intro; Half Title Page; Title Page; Copyright Page; Preface to the Fourth Edition; Preface to the First Edition; Introduction; Contents; Part 1 Getting the Most out of Your History and Physical Examination; Part 2 Algorithms of Symptoms and Signs; Abdominal Pain, Acute; Abdominal Pain, Chronic Recurrent; Abdominal Rigidity; Abdominal Swelling, Focal; Abdominal Swelling, Generalized; Absent or Diminished Pulse; Acid Phosphatase Elevation; Acidosis (Decreased pH); Alkaline Phosphatase Elevation; Alkalosis (Increased pH); Alopecia; Alterations in Serum Iron; Alteration in Serum Uric Acid.…”
Full text (MFA users only)
Electronic eBook -
143
2-D and 3-D image registration for medical, remote sensing, and industrial applications
Published 2005Subjects: “…Algorithms.…”
Full text (MFA users only)
Electronic eBook -
144
Engineering an Algorithm for Reducing Variation in Manufacturing Processes.
Published 2004Table of Contents: “…Material on Enclosed CD-ROM; Figures and Tables; Acknowledgments; Preface; 1 Introduction; PART I Setting the Stage; 2 Describing Processes; 3 Seven Approaches to Variation Reduction; 4 An Algorithm for Reducing Variation; 5 Obtaining Process Knowledge Empirically; PART II Getting Started; 6 Defining a Focused Problem; 7 Checking the Measurement System; 8 Choosing a Working Variation Reduction Approach; PART III Finding a Dominant Cause of Variation; 9 Finding a Dominant Cause Using the Method of Elimination; 10 Investigations to Compare Two Families of Variation.…”
Full text (MFA users only)
Electronic eBook -
145
Geometry with trigonometry
Published 2015Subjects: “…Euclidean algorithm.…”
Full text (MFA users only)
Electronic eBook -
146
A Course in Computational Algebraic Number Theory
Published 1993Table of Contents: “…Fundamental Number-Theoretic Algorithms -- 2. Algorithms for Linear Algebra and Lattices -- 3. …”
Full text (MFA users only)
Electronic eBook -
147
Security of block ciphers : from algorithm design to hardware implementation /
Published 2015Table of Contents: “…Basics of Side-Channel Analysis 152 5.2.1 Side Channels of Digital Circuits 152 5.2.2 Goal of Side-Channel Analysis 154 5.2.3 General Procedures of Side-Channel Analysis 155 5.2.4 Profiling versus Non-profiling Side-Channel Analysis 156 5.2.5 Divide-and-Conquer Algorithm 157 5.3 Side-Channel Analysis on Block Ciphers 159 5.3.1 Power Consumption Measurement in Power Analysis 160 5.3.2 Simple Power Analysis and Differential Power Analysis 163 5.3.3 General Key Recovery Algorithm for DPA 164 5.3.4 Overview of Attack Targets 169 5.3.5 Single-Bit DPA Attack on AES-128 Hardware Implementations 181 5.3.6 Attacks Using HW Model on AES-128 Hardware Implementations 186 5.3.7 Attacks Using HD Model on AES-128 Hardware Implementations 192 5.3.8 Attacks with Collision Model & dagger; 199 5.4 Basics of Fault Analysis 203 5.4.1 Faults Caused by Setup-Time Violations 205 5.4.2 Faults.…”
Full text (MFA users only)
Electronic eBook -
148
Clustering in Linear and Additive Mixed Models.
Published 2013Table of Contents: “…Linear Mixed Models with DPMs using EM Algorithm; 5. Additive Mixed Models with DPMs using MCMC methods; 6. …”
Full text (MFA users only)
Electronic eBook -
149
Pattern Recognition.
Published 2008Table of Contents: “…Front Cover; Pattern Recognition; Copyright Page; Contents; Preface; Chapter 1 Introduction; Chapter 2 Classifiers Based on Bayes Decision Theory; Chapter 3 Linear Classifiers; Chapter 4 Nonlinear Classifiers; Chapter 5 Feature Selection; Chapter 6 Feature Generation I: Data Transformation and Dimensionality Reduction; Chapter 7 Feature Generation II; Chapter 8 Template Matching; Chapter 9 Context-Dependent Classification; Chapter 10 Supervised Learning: The Epilogue; Chapter 11 Clustering: Basic Concepts; Chapter 12 Clustering Algorithms I: Sequential Algorithms.…”
Full text (MFA users only)
Electronic eBook -
150
Optimization in Engineering Sciences : Exact Methods.
Published 2013Table of Contents: “…Lagrange method; 1.4. Simplex algorithm; 1.4.1. Principle; 1.4.2. Simplicial form formulation; 1.4.3. …”
Full text (MFA users only)
Electronic eBook -
151
Signal processing for 5G : algorithms and implementations /
Published 2016Table of Contents: “…Millimeter Waves for 5G: From Theory To Practice / Malik Gul, Eckhard Ohlmer, Ahsan Aziz, Wes McCoy, Yong Rao -- *5G Millimeter-wave Communication Channel and Technology Overview / Li Qian (Clara), Jung Hyejung, Zong Pingping, Wu Geng -- General Principles and Basic Algorithms for Full-duplex Transmission / Thomas Kaiser, Nidal Zarifeh -- Design and Implementation of Full-duplex Transceivers / Katsuyuki Haneda, Mikko Valkama, Taneli Riihonen, Emilio Antonio-Rodriguez, Dani Korpi -- NEW SYSTEM-LEVEL ENABLING TECHNOLOGIES FOR 5G. …”
Full text (MFA users only)
Electronic eBook -
152
Concentration of Measure for the Analysis of Randomized Algorithms.
Published 2009Subjects: “…Algorithms.…”
Full text (MFA users only)
Electronic eBook -
153
Evolutionary computation in gene regulatory network research
Published 2016Table of Contents: “…I: Preliminaries -- A Brief Introduction to Evolutionary and other Nature-Inspired Algorithms / Nasimul Noman and Hitoshi Iba -- Mathematical Models and Computational Methods for Inference of Genetic Networks / Tatsuya Akutsu -- Gene Regulatory Networks: Real Data Sources and Their Analysis / Yuji Zhang -- II: EAs for Gene Expression Data Analysis and GRN Reconstruction -- Biclustering Analysis of Gene Expression Data Using Evolutionary Algorithms / Alan Wee-Chung Liew -- Inference of Vohradský's Models of Genetic Networks Using a Real-Coded Genetic Algorithm / Shuhei Kimura -- GPU-Powered Evolutionary Design of Mass-Action-Based Models of Gene Regulation / Marco S. …”
Full text (MFA users only)
Electronic eBook -
154
Analysis of biological networks
Published 2008Subjects: “…Algorithms…”
Full text (MFA users only)
Electronic eBook -
155
Random Iterative Models
Published 1997Subjects: “…Algorithms.…”
Full text (MFA users only)
Electronic eBook -
156
An Investigation into Authentication Security of GSM algorithm for Mobile Banking.
Published 2014Table of Contents: “…An Investigation into Authentication Security of GSM algorithm for Mobile Banking; Abstract:; Table of Contents:; List of Figures:; Abbreviations; Acknowledgment; Chapter 1: Overview of mobile banking security; 1. …”
Full text (MFA users only)
Electronic eBook -
157
Iterative Algorithms For Multilayer Optimizing Control.
Published 2005Table of Contents: “…Preface; Notation and Acronyms; Contents; Chapter 1 Multilayer Control; Chapter 2 Optimizing Control Layer; Chapter 3 Iterative Correction with Disturbance Estimation; Chapter 4 Integrated System Optimization and Parameter Estimation (ISOPE); Chapter 5 ISOPE for Problems with Output Constraints; Chapter 6 Iterative Algorithms for Dynamic Optimizing Control; Chapter 7 Optimizing Control of Interconnected Systems; Appendix A Proof of Theorem 4.1; Appendix B Proofs of Theorems 7.1, 7.2 and 7.3; Bibliography; Index.…”
Full text (MFA users only)
Electronic eBook -
158
Pedestrian Detection Algorithms using Shearlets.
Published 2019Table of Contents: “…4.3 Conclusion5 Pedestrian Detection using Shearlet Features; 5.1 Pedestrian Detection using Hand-crafted Features; 5.2 Shearlet Image Features; 5.3 Shearlet Filterbank; 5.4 Implementation Details; 5.5 Experiments; 5.5.1 Detection Framework Settings; 5.5.2 Image Feature Experiments; 5.5.3 Filterbank Experiments; 5.6 Conclusion; 6 Deep Learning with Shearlets; 6.1 Introduction on Neural Networks; 6.1.1 Artificial Neural Networks; 6.1.2 Convolutional Neural Networks; 6.1.3 Pedestrian Detection Algorithms using CNNs; 6.2 Integration of Shearlets in CNNs; 6.2.1 Related Work…”
Full text (MFA users only)
Electronic eBook -
159
Parsing schemata for practical text analysis
Published 2010Table of Contents: “…Context-free grammars. 2.2. Parsing algorithms and schemata. 2.3. The formalism of parsing schemata. 2.4. …”
Full text (MFA users only)
Electronic eBook -
160
Optimization of Computer Networks : Modeling and Algorithms: a Hands-On Approach.
Published 2016Table of Contents: “…7.1 Introduction -- 7.2 Node Location Problems -- 7.3 Full Topology Design Problems -- 7.4 Multilayer Network Design -- 7.5 Notes and Sources -- 7.6 Exercises -- References -- Part Two: Algorithms -- Chapter 8: Gradient Algorithms in Network Design -- 8.1 Introduction -- 8.2 Convergence Rates -- 8.3 Projected Gradient Methods -- 8.4 Asynchronous and Distributed Algorithm Implementations -- 8.5 Non-Smooth Functions -- 8.6 Stochastic Gradient Methods -- 8.7 Stopping Criteria -- 8.8 Algorithm Design Hints -- 8.9 Notes and Sources -- 8.10 Exercises -- References…”
Full text (MFA users only)
Electronic eBook