Search Results - (((((((ant OR arte) OR ken) OR kkantor) OR cantor) OR anne) OR halted) OR wanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 46
- Mathematical models 41
- Machine learning 34
- Artificial intelligence 33
- Mathematical optimization 27
- Mathematics 25
- artificial intelligence 21
- Data mining 20
- Computer networks 16
- Artificial Intelligence 14
- Algorithms 13
- Digital techniques 12
- Neural networks (Computer science) 12
- Python (Computer program language) 12
- algorithms 12
- Computer simulation 11
- Data Mining 11
- Development 11
- History 11
- Machine Learning 11
- Security measures 11
- Application software 10
- Electronic data processing 10
- Information technology 10
- Management 10
- Philosophy 10
- Bioinformatics 9
- Social aspects 9
- Technological innovations 9
- methods 9
Search alternatives:
- kkantor »
-
181
-
182
-
183
Introduction to network security : theory and practice
Published 2015Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
Full text (MFA users only)
Electronic eBook -
184
Advances in digital technologies : proceedings of the 6th International Conference on Applications of Digital Information and Web Technologies 2015
Published 2015Table of Contents: “…Application of Genetic Algorithms to Context-Sensitive Text MiningA Decision Tree Classification Model for Determining the Location for Solar Power Plant; A Framework for Multi-Label Learning Using Label Ranking and Correlation; A Comparative Analysis of Pruning Methods for C4.5 and Fuzzy C4.5; Subject Index; Author Index.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
185
-
186
Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs.
Published 2018Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
Full text (MFA users only)
Electronic eBook -
187
Behavioral formation : volatile design processes & the emergence of a strange specificity
Published 2021Table of Contents: “…Intro -- ACKNOWLEDGMENTS -- PREFACE -- INTRODUCTION -- BEHAVIORAL METHODOLOGIES -- FIBROUS ASSEMBLAGES -- FIBROUS TOWER -- POLYSCALAR TECTONICS -- MULTI-AGENT ALGORITHMS -- AGENTBODIES -- BABIY YAR MEMORIAL -- MANIFOLD SWARMS -- RMIT MACE -- BEHAVIORAL COMPOSITES -- COMPOSITE SWARM -- COMPOSITE WING -- RMIT MEETING PAVILION -- AGENTBODY PROTOTYPES -- NGV PAVILION -- STRIATED POLYMERS -- VOLATILITY -- AGENCY OF STRUCTURE -- STRANGE FEEDBACK -- YEOSU PAVILION -- NATIONAL ART MUSEUM OF CHINA -- STRANGE SPECIFICITY -- PAINTERLY FORMATION -- STIGMERGIC ROBOTICS -- CATALOG OF PROJECTS -- GLOSSARY OF TERMS -- BIBLIOGRAPHY.…”
Full text (MFA users only)
Electronic eBook -
188
Optimization advances in electric power systems
Published 2008Table of Contents: “…Unreliability Costs -- 3.5. Proposed Algorithms -- 3.5.1. ES and TS Algorithms -- 3.5.2. …”
Full text (MFA users only)
Electronic eBook -
189
Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques.
Published 2018Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
Full text (MFA users only)
Electronic eBook -
190
-
191
Data clustering in C++ : an object-oriented approach
Published 2011Full text (MFA users only)
Electronic eBook -
192
Debates in the digital humanities 2016
Published 2016Table of Contents: “…The Differences Between Digital Humanities and Digital History / Stephen Robertson -- Digital History Perpetual Future Tense / Cameron Blevins -- Collections and/of Data: Art History and the Art Museum in the DH Mode / Matthew Battles and Michael Maizels -- Archaeology, the Digital Humanities, and the "Big Tent" / Ethan Watrall ; Navigating the Global Digital Humanities: Insights from Black Feminism / Roopika Risam. …”
Full text (MFA users only)
Electronic eBook -
193
Machine Learning with Core ML : an IOS Developer's Guide to Implementing Machine Learning in Mobile Apps.
Published 2018Table of Contents: “…Learning algorithms Auto insurance in Sweden; Supported learning algorithms; Considerations ; Summary; Chapter 3: Recognizing Objects in the World; Understanding images; Recognizing objects in the world; Capturing data ; Preprocessing the data; Performing inference ; Summary ; Chapter 4: Emotion Detection with CNNs; Facial expressions; Input data and preprocessing ; Bringing it all together; Summary ; Chapter 5: Locating Objects in the World; Object localization and object detection ; Converting Keras Tiny YOLO to Core ML; Making it easier to find photos; Optimizing with batches; Summary.…”
Full text (MFA users only)
Electronic eBook -
194
Function Estimates.
Published 1986Table of Contents: “…Partial spline modelling of the tropopause and other discontinuitiesChoice of smoothing parameter in deconvolution problems -- Regression approximation using projections and isotropic kernels -- Will the art of smoothing ever become a science?…”
Full text (MFA users only)
Electronic eBook -
195
-
196
-
197
Handbook of foot and ankle orthopedics
Published 2016Table of Contents: “…-- Plantar heel pain -- Growing with flat feet: childhood to adulthood -- Lucid approach and simplistic management of diabetic foot -- Common foot and ankle infections: diagnosis and management -- Art of arthrodesis in foot and ankle -- Dealing with tendo achilles problems! …”
Full text (MFA users only)
Electronic eBook -
198
Advances in time series forecasting. Volume 2
Published 2017Table of Contents: “…INTRODUCTION -- CLASSICAL TIME SERIES FORECASTING MODELS -- ARTIFICIAL NEURAL NETWORKS FOR FORECASTING TIME SERIES -- A NEW ARTIFICIAL NEURAL NETWORK WITH DETERMINISTIC COMPONENTS -- APPLICATIONS -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A Fuzzy Time Series Approach Based on Genetic Algorithm with Single Analysis Process -- Ozge Cagcag Yolcu* -- INTRODUCTION -- FUZZY TIME SERIES -- RELATED METHODS -- Genetic Algorithm (GA) -- Single Multiplicative Neuron Model -- PROPOSED METHOD -- APPLICATIONS -- CONCLUSION AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Forecasting Stock Exchanges with Fuzzy Time Series Approach Based on Markov Chain Transition Matrix -- Cagdas Hakan Aladag1,* and Hilal Guney2 -- INTRODUCTION -- FUZZY TIME SERIES -- TSAUR 'S FUZZY TIME SERIES MARKOV CHAIN MODEL -- THE IMPLEMENTATION -- CONCLUSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- A New High Order Multivariate Fuzzy Time Series Forecasting Model -- Ufuk Yolcu* -- INTRODUCTION -- RELATED METHODOLOGY -- The Fuzzy C-Means (FCM) Clustering Method -- Single Multiplicative Neuron Model Artificial Neural Network (SMN-ANN) -- Fuzzy Time Series -- THE PROPOSED METHOD -- APPLICATIONS -- CONCLUSIONS AND DISCUSSION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Fuzzy Functions Approach for Time Series Forecasting -- Ali Z. …”
Full text (MFA users only)
Electronic eBook -
199
Ultrashort Pulse Laser Ablation of Bulk Materials Using Shaped Laser Beams.
Published 2021Table of Contents: “…Intro -- 1 Introduction -- 2 Theoretical principles and state of the art -- 2.1 Ultrashort pulse laser technology for materialprocessing -- 2.2 Laser beam shaping -- 2.3 Liquid crystal on silicon spatial light modulators -- 2.4 Phase retrieval algorithms -- 3 Materials and methods -- 3.1 Processed materials -- 3.2 System components -- 3.3 Characterization methods -- 4 Theoretical calculation of limits for theincrease of volumetric ablation rate -- 4.1 Heat accumulation modeling for spatially shapedbeams -- 4.2 Ideal requirements on laser sources as well as beamshaping and guiding optics…”
Full text (MFA users only)
eBook -
200