Search Results - (((((((ant OR alter) OR find) OR kkantor) OR cantor) OR anne) OR halted) OR wanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 48
- Machine learning 34
- Artificial intelligence 30
- Mathematical models 28
- Mathematics 28
- Data mining 27
- methods 23
- Mathematical optimization 22
- algorithms 22
- artificial intelligence 21
- Algorithms 20
- Python (Computer program language) 16
- Computer networks 15
- Computer algorithms 14
- Research 14
- Artificial Intelligence 13
- Data Mining 12
- Diseases 12
- Management 12
- Neural networks (Computer science) 12
- R (Computer program language) 12
- Big data 11
- Bioinformatics 11
- Development 11
- Digital techniques 11
- Information technology 11
- Signal processing 11
- Technological innovations 11
- Application software 10
- Image processing 10
Search alternatives:
- kkantor »
-
561
Exploratory data analysis with MATLAB
Published 2017Table of Contents: “…3.4 Stochastic Neighbor Embedding3.5 Summary and Further Reading; Exercises; Chapter 4 Data Tours; 4.1 Grand Tour; 4.1.1 Torus Winding Method; 4.1.2 Pseudo Grand Tour; 4.2 Interpolation Tours; 4.3 Projection Pursuit; 4.4 Projection Pursuit Indexes; 4.4.1 Posse Chi-Square Index; 4.4.2 Moment Index; 4.5 Independent Component Analysis; 4.6 Summary and Further Reading; Exercises; Chapter 5 Finding Clusters; 5.1 Introduction; 5.2 Hierarchical Methods; 5.3 Optimization Methods- k-Means; 5.4 Spectral Clustering; 5.5 Document Clustering; 5.5.1 Nonnegative Matrix Factorization -- Revisited.…”
Full text (MFA users only)
Electronic eBook -
562
-
563
Wavelet Analysis and Transient Signal Processing Applications for Power Systems.
Published 2016Full text (MFA users only)
Electronic eBook -
564
Swift 2 design patterns : build robust and scalable iOS and Mac OS X game applications
Published 2015Full text (MFA users only)
Electronic eBook -
565
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
566
Technologies for sustainable development : proceedings of the 7th Nirma University International Conference on Engineering (NUiCONE 2019), November 21-22, 2019, Ahmedabad, India
Published 2020Full text (MFA users only)
Electronic Conference Proceeding eBook -
567
The illustrated network : how TCP/IP works in a modern network
Published 2017Table of Contents: “…-- An Audience Note for the Second Edition -- What You Won't Find in This Book -- And One More Thing Before I Go -- Oh, One More Thing -- The Illustrated Network -- Using This Book -- Source Code -- Acknowledgments -- Technical Reviewers -- I. …”
Full text (MFA users only)
Electronic eBook -
568
Medical and Care Compunetics 2 : Medical and Care Compunetics 2.
Published 2005Full text (MFA users only)
Electronic eBook -
569
Mechanical and Electronics Engineering : proceedings of the International Conference on ICMEE 2009, Chennai, India, 24-26 July 2009
Published 2010Full text (MFA users only)
Electronic Conference Proceeding eBook -
570
Penetration testing : a hands-on introduction to hacking
Published 2014Table of Contents: “…Using The Metasploit Framework / Peter Van Eeckhoutte -- Starting Metasploit / Peter Van Eeckhoutte -- Finding Metasploit Modules / Peter Van Eeckhoutte.…”
Full text (MFA users only)
Electronic eBook -
571
Optimization of Wastewater Lift Stations for Reduction of Energy Usage and Greenhouse Gas Emissions.
Published 2014Full text (MFA users only)
Electronic eBook -
572
-
573
Mastering Active Directory
Published 2017Table of Contents: “…Installation steps -- Setting up an additional domain controller -- Active Directory Domain Service installation checklist for an additional domain controller -- Design topology -- Installation steps -- Setting up a new domain tree -- Active Directory Domain Service installation checklist for a new domain tree -- Design topology -- Installation steps -- Setting up a new child domain -- Active Directory Domain Service installation checklist for a new child domain -- Design topology -- Installation steps -- How to plan Active Directory migrations -- Migration life cycle -- Audit -- Active Directory logical and physical topology -- Active Directory health check -- System Center Operation Manager and Operation Management Suite -- Active Directory health checklist -- Application audit -- Plan -- Implementation -- Active Directory migration checklist -- Design topology -- Installation steps -- Verification -- Maintain -- Summary -- Chapter 7: Managing Active Directory Objects -- Tools and methods to manage objects -- Active Directory Administrative Center -- The Active Directory Users and Computers MMC -- Active Directory object administration with PowerShell -- Creating, modifying, and removing objects in Active Directory -- Creating Active Directory objects -- Creating user objects -- Creating computer objects -- Modifying Active Directory objects -- Removing Active Directory objects -- Finding objects in Active Directory -- Finding objects using PowerShell -- Summary -- Chapter 8: Managing Users, Groups, and Devices -- Object attributes -- Custom attributes -- User accounts -- Managed Service Accounts -- Group Managed Service Accounts -- Uninstalling Managed Service Account -- Groups -- Group scope -- Converting groups -- Setting up groups -- Devices and other objects -- Best practices -- Summary -- Chapter 9: Designing the OU Structure.…”
Full text (MFA users only)
Electronic eBook -
574
-
575
-
576
-
577
Atlas of minimally invasive surgery for lung and esophageal cancer
Published 2017Full text (MFA users only)
Electronic eBook -
578
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
Full text (MFA users only)
Electronic eBook -
579
-
580