Search Results - (((((((ant OR alter) OR find) OR kantor) OR cantor) OR anne) OR salted) OR wanting) algorithms.

  1. 581
  2. 582

    Penetration testing : a hands-on introduction to hacking by Weidman, Georgia

    Published 2014
    Table of Contents: “…Using The Metasploit Framework / Peter Van Eeckhoutte -- Starting Metasploit / Peter Van Eeckhoutte -- Finding Metasploit Modules / Peter Van Eeckhoutte.…”
    Full text (MFA users only)
    Electronic eBook
  3. 583
  4. 584

    Hands-On Deep Learning with TensorFlow. by Boxel, Dan Van

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  5. 585

    Mastering Active Directory by Francis, Dishan

    Published 2017
    Table of Contents: “…Installation steps -- Setting up an additional domain controller -- Active Directory Domain Service installation checklist for an additional domain controller -- Design topology -- Installation steps -- Setting up a new domain tree -- Active Directory Domain Service installation checklist for a new domain tree -- Design topology -- Installation steps -- Setting up a new child domain -- Active Directory Domain Service installation checklist for a new child domain -- Design topology -- Installation steps -- How to plan Active Directory migrations -- Migration life cycle -- Audit -- Active Directory logical and physical topology -- Active Directory health check -- System Center Operation Manager and Operation Management Suite -- Active Directory health checklist -- Application audit -- Plan -- Implementation -- Active Directory migration checklist -- Design topology -- Installation steps -- Verification -- Maintain -- Summary -- Chapter 7: Managing Active Directory Objects -- Tools and methods to manage objects -- Active Directory Administrative Center -- The Active Directory Users and Computers MMC -- Active Directory object administration with PowerShell -- Creating, modifying, and removing objects in Active Directory -- Creating Active Directory objects -- Creating user objects -- Creating computer objects -- Modifying Active Directory objects -- Removing Active Directory objects -- Finding objects in Active Directory -- Finding objects using PowerShell -- Summary -- Chapter 8: Managing Users, Groups, and Devices -- Object attributes -- Custom attributes -- User accounts -- Managed Service Accounts -- Group Managed Service Accounts -- Uninstalling Managed Service Account -- Groups -- Group scope -- Converting groups -- Setting up groups -- Devices and other objects -- Best practices -- Summary -- Chapter 9: Designing the OU Structure.…”
    Full text (MFA users only)
    Electronic eBook
  6. 586

    Danforth's obstetrics and gynecology.

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  7. 587

    Manipulative voting dynamics by Gohar, Neelam

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  8. 588

    Electric Power System Fundamentals. by Acha Daza, Salvador

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  9. 589
  10. 590

    Artificial intelligence and data mining approaches in security frameworks

    Published 2021
    Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
    Full text (MFA users only)
    Electronic eBook
  11. 591

    Android Sensor Programming By Example. by Nagpal, Varun

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  12. 592

    Mastering D3.js. by Castillo, Pablo Navarro

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  13. 593
  14. 594
  15. 595

    Medicine Meets Virtual Reality 13 : the Magical Next Becomes the Medical Now

    Published 2005
    Table of Contents: “…Spherical mechanism analysis of a surgical robot for minimally invasive surgery -- analytical and experimental approaches -- Using an ontology of human anatomy to inform reasoning with geometric models -- Assessing surgical skill training under hazardous conditions in a virtual environment -- An automatic robust meshing algorithm for soft tissue modeling -- Visualizing volumetric data sets using a wireless handheld computer -- Quantifying risk behavior in surgical simulation -- Haptic herniorrhaphy simulation with robust and fast collision detection algorithm -- Affordable virtual environments: Buildinga virtual beach for clinical use -- Analysis of masticatory muscle condition using the 4-dimensional muscle model for a patient with square mandible -- Automated renderer for visual human and volumetric scan segmentations -- Distributed collaborative radiological visualization using access grid -- Development of a method for surface and subsurface modeling using force and position sensors -- The physiology and pharmacology of growing old, as shown in body simulation -- Physiologic and chemical simulation of cyanide and sarin toxicity and therapy.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  16. 596
  17. 597
  18. 598

    Introduction to computational economics using fortran by Fehr, Hans, Kindermann, Fabian, 1984-

    Published 2018
    Table of Contents: “…Brent & aposs and Powell & aposs algorithms -- 2.3.3. The problem of local and global minima -- 2.4. …”
    Full text (MFA users only)
    Electronic eBook
  19. 599

    Understanding smart sensors by Frank, Randy

    Published 2013
    Table of Contents: “…ZigBee-Like Wireless -- 8.3.3. ANT+ -- 8.3.4.6LoWPAN -- 8.3.5. Near Field Communication (NFC) -- 8.3.6.Z-Wave -- 8.3.7. …”
    Full text (MFA users only)
    Electronic eBook
  20. 600

    Corporate strategy for dramatic productivity surge

    Published 2013
    Full text (MFA users only)
    Electronic eBook