Search Results - (((((((ant OR arte) OR wikant) OR data) OR cantor) OR anne) OR halted) OR wanting) algorithms.

  1. 81
  2. 82

    Jewels of stringology : text algorithms. by RYTTER, WOJCIECH

    Published 2002
    Table of Contents: “…Text file facilities. 1.2. Dictionaries. 1.3. Data compression. 1.4. Applications of text algorithms in genetics. 1.5. …”
    Full text (MFA users only)
    Electronic eBook
  3. 83

    GMDH-methodology and implementation in C

    Published 2015
    Subjects: “…GMDH algorithms.…”
    Full text (MFA users only)
    Electronic eBook
  4. 84
  5. 85

    Ant colony optimization by Dorigo, Marco

    Published 2004
    Table of Contents: “…Preface; Acknowledgments; 1 -- From Real to Artificial Ants; 2 -- The Ant Colony Optimization Metaheuristic; 3 -- Ant Colony Optimization Algorithms for the Traveling Salesman Problem; 4 -- Ant Colony Optimization Theory; 5 -- Ant Colony Optimization for NP-Hard Problems; 6 -- AntNet: An ACO Algorithm for Data Network Routing; 7 -- Conclusions and Prospects for the Future; Appendix: Sources of Information about the ACO Field; References; Index.…”
    Full text (MFA users only)
    Electronic eBook
  6. 86

    The mathematica guidebook for numerics by Trott, Michael, Ph. D.

    Published 2006
    Subjects: “…Algebra Data processing.…”
    Full text (MFA users only)
    Electronic eBook
  7. 87

    Principles of Broadband Switching and Networking. by Liew, Soung C.

    Published 2008
    Subjects: “…Algorithms…”
    Full text (MFA users only)
    Electronic eBook
  8. 88

    Introduction to cryptography by Padhye, Sahadeo, Sahu, Rajeev A., Saraswat, Vishal

    Published 2018
    Table of Contents: “…Notation Types of algorithm Complexity Classes Exercise Classical Cryptosystems Classification of Classical Cryptosystem Block Cipher Stream Cipher Cryptanalysis of Cryptosystems Exercise Block Ciphers Introduction Modes of Operation Padding Design Considerations Data Encryption Standard Advanced Encryption Standard Exercise Hash Function Compression and Hash Functions Hash function for cryptography Random Oracle Model Cryptographic Hash Functions Exercise Public Key Cryptosystem Introduction Diffie-Hellman Key Exchange Protocol RSA Cryptosystem Rabin Cryptosystem ElGamal Cryptosystem Elliptic Curve Cryptosystem Exercises Digital Signature Formal Definitions Attack Goals for Digital.…”
    Full text (MFA users only)
    Electronic eBook
  9. 89

    Machine learning for computer and cyber security : principles, algorithms, and practices

    Published 2019
    Table of Contents: “…Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture -- 11. …”
    Full text (MFA users only)
    Electronic eBook
  10. 90

    Algorithmic techniques for the polymer sciences by Tice, Bradley S.

    Published 2015
    Table of Contents: “…Front Cover; About the Editor; Preface; Contents; Introduction; Review of the Literature; Chapter 1: Polymers; Chapter 2: Compression of Data; Chapter 3: Natural Language Compression; Chapter 4: Formal Language Compression; Chapter 5: Types of Compression Programs; Chapter 6: Algorithmic Compression; Chapter 7: Chemical Formulas; Chapter 8: Fischer Projection; Chapter 9: Compression of Polymers; Chapter 10: Line Notation Systems and Compression; Chapter 11: Current Trends in Research; Chapter 12: Big Data; Chapter 13: Modeling Complexity in Molecular Systems: A Revised Edition.…”
    Full text (MFA users only)
    Electronic eBook
  11. 91

    Support vector machine in chemistry

    Published 2004
    Table of Contents: “…Kernel functions: technique for nonlinear data processing by linear algorithm. 1.7. Support vector regression: regression based on principle of statistical learning theory. 1.8. …”
    Full text (MFA users only)
    Electronic eBook
  12. 92
  13. 93

    Programming. Architecture. by Coates, Paul

    Published 2010
    Subjects: “…Architectural design Data processing.…”
    Full text (MFA users only)
    Electronic eBook
  14. 94

    Computational technologies. Advanced topics

    Published 2015
    Subjects: “…Mathematics Data processing Textbooks.…”
    Full text (MFA users only)
    Electronic eBook
  15. 95

    Learning Causal Models Of Multivariate Systems : And The Value Of It For The Performance Modeling Of Computer Programs. by Lemeire, Jan

    Published 2007
    Table of Contents: “…""Qualitative Property and Qualitative Reasoning""""The Occurence of Independencies""; ""Graphoid Properties""; ""Markov networks""; ""Bayesian Networks""; ""Representation of Distributions""; ""Representation of Independencies""; ""Graphical Causal Models""; ""Defining Causality: The Shadow's Cause""; ""Interventions""; ""Causally Interpreted Bayesian Networks""; ""Invalidity of the Markov Network Representation""; ""Causal Structure Learning Algorithms""; ""The PC Algorithm""; ""Assumptions""; ""Complexity""; ""Summary of Chapter""…”
    Full text (MFA users only)
    Electronic eBook
  16. 96

    Pathway modeling and algorithm research

    Published 2011
    Table of Contents: “…PATHWAY MODELING AND ALGORITHM RESEARCH; PATHWAY MODELING AND ALGORITHM RESEARCH; Contents; Preface; Biological Pathways and Their Modeling; Abstract; 1. …”
    Full text (MFA users only)
    Electronic eBook
  17. 97

    Mastering Machine Learning Algorithms : Expert techniques to implement popular machine learning algorithms and fine-tune your models. by Bonaccorso c/o Quandoo, Giuseppe

    Published 2018
    Table of Contents: “…Conditional probabilities and Bayes' theoremBayesian networks; Sampling from a Bayesian network; Direct sampling; Example of direct sampling; A gentle introduction to Markov chains; Gibbs sampling; Metropolis-Hastings sampling; Example of Metropolis-Hastings sampling; Sampling example using PyMC3; Hidden Markov Models (HMMs); Forward-backward algorithm; Forward phase; Backward phase; HMM parameter estimation; Example of HMM training with hmmlearn; Viterbi algorithm; Finding the most likely hidden state sequence with hmmlearn; Summary; Chapter 5: EM Algorithm and Applications.…”
    Full text (MFA users only)
    Electronic eBook
  18. 98
  19. 99

    Algorithmic problems of group theory, their complexity, and applications to cryptography

    Published 2015
    Subjects: “…Algorithms Congresses.…”
    Full text (MFA users only)
    Electronic eBook
  20. 100

    Hands-On Ensemble Learning with R : a Beginner's Guide to Combining the Power of Machine Learning Algorithms Using Ensemble Techniques. by Tattar, Prabhanjan Narayanachar

    Published 2018
    Table of Contents: “…Bootstrapping survival models*Bootstrapping time series models*; Summary; Chapter 3: Bagging; Technical requirements; Classification trees and pruning; Bagging; k-NN classifier; Analyzing waveform data; k-NN bagging; Summary; Chapter 4: Random Forests; Technical requirements; Random Forests; Variable importance; Proximity plots; Random Forest nuances; Comparisons with bagging; Missing data imputation; Clustering with Random Forest; Summary; Chapter 5: The Bare Bones Boosting Algorithms; Technical requirements; The general boosting algorithm; Adaptive boosting; Gradient boosting.…”
    Full text (MFA users only)
    Electronic eBook