Search Results - (((((((ant OR alter) OR find) OR kantor) OR cantor) OR anne) OR salted) OR wanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 48
- Machine learning 34
- Artificial intelligence 31
- Mathematical models 28
- Mathematics 28
- Data mining 27
- methods 24
- algorithms 23
- Algorithms 22
- Mathematical optimization 22
- artificial intelligence 21
- Python (Computer program language) 16
- Research 16
- Computer algorithms 15
- Computer networks 15
- Artificial Intelligence 13
- Diseases 13
- Data Mining 12
- Management 12
- Neural networks (Computer science) 12
- R (Computer program language) 12
- Technological innovations 12
- Big data 11
- Bioinformatics 11
- Development 11
- Digital techniques 11
- Information technology 11
- Signal processing 11
- Application software 10
- Image processing 10
Search alternatives:
- ant »
- kantor »
- cantor »
- wanting »
- find »
- salted »
-
581
Mechanical and Electronics Engineering : proceedings of the International Conference on ICMEE 2009, Chennai, India, 24-26 July 2009
Published 2010Full text (MFA users only)
Electronic Conference Proceeding eBook -
582
Penetration testing : a hands-on introduction to hacking
Published 2014Table of Contents: “…Using The Metasploit Framework / Peter Van Eeckhoutte -- Starting Metasploit / Peter Van Eeckhoutte -- Finding Metasploit Modules / Peter Van Eeckhoutte.…”
Full text (MFA users only)
Electronic eBook -
583
Optimization of Wastewater Lift Stations for Reduction of Energy Usage and Greenhouse Gas Emissions.
Published 2014Full text (MFA users only)
Electronic eBook -
584
-
585
Mastering Active Directory
Published 2017Table of Contents: “…Installation steps -- Setting up an additional domain controller -- Active Directory Domain Service installation checklist for an additional domain controller -- Design topology -- Installation steps -- Setting up a new domain tree -- Active Directory Domain Service installation checklist for a new domain tree -- Design topology -- Installation steps -- Setting up a new child domain -- Active Directory Domain Service installation checklist for a new child domain -- Design topology -- Installation steps -- How to plan Active Directory migrations -- Migration life cycle -- Audit -- Active Directory logical and physical topology -- Active Directory health check -- System Center Operation Manager and Operation Management Suite -- Active Directory health checklist -- Application audit -- Plan -- Implementation -- Active Directory migration checklist -- Design topology -- Installation steps -- Verification -- Maintain -- Summary -- Chapter 7: Managing Active Directory Objects -- Tools and methods to manage objects -- Active Directory Administrative Center -- The Active Directory Users and Computers MMC -- Active Directory object administration with PowerShell -- Creating, modifying, and removing objects in Active Directory -- Creating Active Directory objects -- Creating user objects -- Creating computer objects -- Modifying Active Directory objects -- Removing Active Directory objects -- Finding objects in Active Directory -- Finding objects using PowerShell -- Summary -- Chapter 8: Managing Users, Groups, and Devices -- Object attributes -- Custom attributes -- User accounts -- Managed Service Accounts -- Group Managed Service Accounts -- Uninstalling Managed Service Account -- Groups -- Group scope -- Converting groups -- Setting up groups -- Devices and other objects -- Best practices -- Summary -- Chapter 9: Designing the OU Structure.…”
Full text (MFA users only)
Electronic eBook -
586
-
587
-
588
-
589
Atlas of minimally invasive surgery for lung and esophageal cancer
Published 2017Full text (MFA users only)
Electronic eBook -
590
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
Full text (MFA users only)
Electronic eBook -
591
-
592
-
593
-
594
Adventures in Authentic Learning : 21 Step-by-Step Projects From an Edtech Coach.
Published 2020Full text (MFA users only)
Electronic eBook -
595
Medicine Meets Virtual Reality 13 : the Magical Next Becomes the Medical Now
Published 2005Table of Contents: “…Spherical mechanism analysis of a surgical robot for minimally invasive surgery -- analytical and experimental approaches -- Using an ontology of human anatomy to inform reasoning with geometric models -- Assessing surgical skill training under hazardous conditions in a virtual environment -- An automatic robust meshing algorithm for soft tissue modeling -- Visualizing volumetric data sets using a wireless handheld computer -- Quantifying risk behavior in surgical simulation -- Haptic herniorrhaphy simulation with robust and fast collision detection algorithm -- Affordable virtual environments: Buildinga virtual beach for clinical use -- Analysis of masticatory muscle condition using the 4-dimensional muscle model for a patient with square mandible -- Automated renderer for visual human and volumetric scan segmentations -- Distributed collaborative radiological visualization using access grid -- Development of a method for surface and subsurface modeling using force and position sensors -- The physiology and pharmacology of growing old, as shown in body simulation -- Physiologic and chemical simulation of cyanide and sarin toxicity and therapy.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
596
Nuclear Medicine Imaging: An Encyclopedic Dictionary
Published 2012Full text (MFA users only)
Electronic eBook -
597
Techniques for Noise Robustness in Automatic Speech Recognition.
Published 2012Full text (MFA users only)
Electronic eBook -
598
Introduction to computational economics using fortran
Published 2018Table of Contents: “…Brent & aposs and Powell & aposs algorithms -- 2.3.3. The problem of local and global minima -- 2.4. …”
Full text (MFA users only)
Electronic eBook -
599
Understanding smart sensors
Published 2013Table of Contents: “…ZigBee-Like Wireless -- 8.3.3. ANT+ -- 8.3.4.6LoWPAN -- 8.3.5. Near Field Communication (NFC) -- 8.3.6.Z-Wave -- 8.3.7. …”
Full text (MFA users only)
Electronic eBook -
600
Corporate strategy for dramatic productivity surge
Published 2013Full text (MFA users only)
Electronic eBook