Search Results - (((((((ant OR ante) OR wikant) OR data) OR cantor) OR anne) OR walted) OR anti) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 250
- Mathematical models 143
- Mathematics 109
- Artificial intelligence 102
- Machine learning 99
- Algorithms 79
- Data mining 78
- algorithms 74
- artificial intelligence 65
- Computer algorithms 54
- Computer networks 53
- methods 46
- Technological innovations 43
- Data Mining 42
- Big data 41
- Digital techniques 41
- Artificial Intelligence 39
- Computer simulation 39
- Electronic data processing 39
- Mathematical optimization 38
- Statistical methods 38
- Research 37
- Security measures 37
- Signal processing 37
- Bioinformatics 36
- Python (Computer program language) 36
- Information technology 35
- Computer science 34
- Management 32
- Computational Biology 31
Search alternatives:
- ant »
- ante »
- wikant »
- cantor »
- anti »
- walted »
-
81
Swarm intelligence and bio-inspired computation : theory and applications
Published 2013Full text (MFA users only)
Electronic eBook -
82
GMDH-methodology and implementation in C
Published 2015Subjects: “…GMDH algorithms.…”
Full text (MFA users only)
Electronic eBook -
83
The mathematica guidebook for numerics
Published 2006Subjects: “…Algebra Data processing.…”
Full text (MFA users only)
Electronic eBook -
84
Principles of Broadband Switching and Networking.
Published 2008Subjects: “…Algorithms…”
Full text (MFA users only)
Electronic eBook -
85
Introduction to cryptography
Published 2018Table of Contents: “…Notation Types of algorithm Complexity Classes Exercise Classical Cryptosystems Classification of Classical Cryptosystem Block Cipher Stream Cipher Cryptanalysis of Cryptosystems Exercise Block Ciphers Introduction Modes of Operation Padding Design Considerations Data Encryption Standard Advanced Encryption Standard Exercise Hash Function Compression and Hash Functions Hash function for cryptography Random Oracle Model Cryptographic Hash Functions Exercise Public Key Cryptosystem Introduction Diffie-Hellman Key Exchange Protocol RSA Cryptosystem Rabin Cryptosystem ElGamal Cryptosystem Elliptic Curve Cryptosystem Exercises Digital Signature Formal Definitions Attack Goals for Digital.…”
Full text (MFA users only)
Electronic eBook -
86
Machine learning for computer and cyber security : principles, algorithms, and practices
Published 2019Table of Contents: “…Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture -- 11. …”
Full text (MFA users only)
Electronic eBook -
87
Algorithmic techniques for the polymer sciences
Published 2015Table of Contents: “…Front Cover; About the Editor; Preface; Contents; Introduction; Review of the Literature; Chapter 1: Polymers; Chapter 2: Compression of Data; Chapter 3: Natural Language Compression; Chapter 4: Formal Language Compression; Chapter 5: Types of Compression Programs; Chapter 6: Algorithmic Compression; Chapter 7: Chemical Formulas; Chapter 8: Fischer Projection; Chapter 9: Compression of Polymers; Chapter 10: Line Notation Systems and Compression; Chapter 11: Current Trends in Research; Chapter 12: Big Data; Chapter 13: Modeling Complexity in Molecular Systems: A Revised Edition.…”
Full text (MFA users only)
Electronic eBook -
88
Support vector machine in chemistry
Published 2004Table of Contents: “…Kernel functions: technique for nonlinear data processing by linear algorithm. 1.7. Support vector regression: regression based on principle of statistical learning theory. 1.8. …”
Full text (MFA users only)
Electronic eBook -
89
Machine Learning and Big Data with KDB+/Q : Q, High Frequency Financial Data and Algorithmic Trading.
Published 2019Full text (MFA users only)
Electronic eBook -
90
Programming. Architecture.
Published 2010Subjects: “…Architectural design Data processing.…”
Full text (MFA users only)
Electronic eBook -
91
Computational technologies. Advanced topics
Published 2015Subjects: “…Mathematics Data processing Textbooks.…”
Full text (MFA users only)
Electronic eBook -
92
Learning Causal Models Of Multivariate Systems : And The Value Of It For The Performance Modeling Of Computer Programs.
Published 2007Table of Contents: “…""Qualitative Property and Qualitative Reasoning""""The Occurence of Independencies""; ""Graphoid Properties""; ""Markov networks""; ""Bayesian Networks""; ""Representation of Distributions""; ""Representation of Independencies""; ""Graphical Causal Models""; ""Defining Causality: The Shadow's Cause""; ""Interventions""; ""Causally Interpreted Bayesian Networks""; ""Invalidity of the Markov Network Representation""; ""Causal Structure Learning Algorithms""; ""The PC Algorithm""; ""Assumptions""; ""Complexity""; ""Summary of Chapter""…”
Full text (MFA users only)
Electronic eBook -
93
Pathway modeling and algorithm research
Published 2011Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
Full text (MFA users only)
Electronic eBook -
94
Mastering Machine Learning Algorithms : Expert techniques to implement popular machine learning algorithms and fine-tune your models.
Published 2018Table of Contents: “…Conditional probabilities and Bayes' theoremBayesian networks; Sampling from a Bayesian network; Direct sampling; Example of direct sampling; A gentle introduction to Markov chains; Gibbs sampling; Metropolis-Hastings sampling; Example of Metropolis-Hastings sampling; Sampling example using PyMC3; Hidden Markov Models (HMMs); Forward-backward algorithm; Forward phase; Backward phase; HMM parameter estimation; Example of HMM training with hmmlearn; Viterbi algorithm; Finding the most likely hidden state sequence with hmmlearn; Summary; Chapter 5: EM Algorithm and Applications.…”
Full text (MFA users only)
Electronic eBook -
95
Distributed control of robotic networks : a mathematical approach to motion coordination algorithms
Published 2009Full text (MFA users only)
Electronic eBook -
96
Algorithmic problems of group theory, their complexity, and applications to cryptography
Published 2015Subjects: “…Algorithms Congresses.…”
Full text (MFA users only)
Electronic eBook -
97
Hands-On Ensemble Learning with R : a Beginner's Guide to Combining the Power of Machine Learning Algorithms Using Ensemble Techniques.
Published 2018Table of Contents: “…Bootstrapping survival models*Bootstrapping time series models*; Summary; Chapter 3: Bagging; Technical requirements; Classification trees and pruning; Bagging; k-NN classifier; Analyzing waveform data; k-NN bagging; Summary; Chapter 4: Random Forests; Technical requirements; Random Forests; Variable importance; Proximity plots; Random Forest nuances; Comparisons with bagging; Missing data imputation; Clustering with Random Forest; Summary; Chapter 5: The Bare Bones Boosting Algorithms; Technical requirements; The general boosting algorithm; Adaptive boosting; Gradient boosting.…”
Full text (MFA users only)
Electronic eBook -
98
A CALCULUS OF IDEAS : a MATHEMATICAL STUDY OF HUMAN THOUGHT.
Published 2012Full text (MFA users only)
Electronic eBook -
99
Swarm Intelligence Algorithms : Modifications and Applications.
Published 2020Table of Contents: “…-- 1.2.3 Pseudo-code of standard ACO algorithm -- 1.3 Modified variants of ant colony optimization -- 1.3.1 Elitist ant systems -- 1.3.2 Ant colony system -- 1.3.3 Max-min ant system -- 1.3.4 Rank based ant systems -- 1.3.5 Continuous orthogonal ant systems…”
Full text (MFA users only)
Electronic eBook -
100
How to guard an art gallery and other discrete mathematical adventures
Published 2009Full text (MFA users only)
Electronic eBook