Search Results - (((((((ant OR arts) OR vian) OR data) OR cantor) OR anne) OR walted) OR wanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 250
- Mathematical models 151
- Mathematics 110
- Artificial intelligence 101
- Machine learning 101
- Algorithms 81
- Data mining 78
- algorithms 75
- artificial intelligence 65
- Computer algorithms 55
- Computer networks 55
- methods 48
- Digital techniques 46
- Mathematical optimization 45
- Data Mining 42
- Technological innovations 42
- Big data 41
- Computer simulation 41
- Statistical methods 40
- Artificial Intelligence 39
- Electronic data processing 39
- Signal processing 39
- Bioinformatics 37
- Python (Computer program language) 37
- Research 37
- Security measures 37
- Information technology 36
- Image processing 35
- Management 35
- Computer science 34
Search alternatives:
-
341
Turing's vision : the birth of computer science
Published 2016Full text (MFA users only)
Electronic eBook -
342
-
343
Machine Learning for Asset Management New Developments and Financial Applications
Published 2020Table of Contents: “…Empirical application -- 1.3.1. Data -- 1.3.2. Forecasts -- 1.3.3. Statistical gains -- 1.3.4. …”
Full text (MFA users only)
Electronic eBook -
344
Monnaies cryptées et blockchain : La confiance est-elle un algorithme? = Encrypted currencies and blockchain: is trust an algorithm?.
Published 2018Table of Contents: “…9.2 Le big data contre les banques?9.3 Algorithme et tiers de confiance; 9.4 Le débat est ouvert; Deuxième partie : La blockchain est-elle l'alpha et l'oméga des relations sociales du futur?…”
Full text (MFA users only)
Electronic eBook -
345
Adventures in Raspberry Pi
Published 2017Table of Contents: “…Programming the Sensors to Find Out the Current Temperature -- Creating Pixel Art -- Creating a Sense HAT Desk Thermometer -- Further Adventures with Cameras and HATs -- Chapter 10 The Big Adventure: Building a Raspberry Pi Jukebox -- An Overview of the Jukebox Project -- What You Will Need -- Part One: Creating the LCD Screen -- Preparing the LCD Screen by Adding Headers -- Mounting the LCD Screen and Wiring Up the Breadboard -- Adding Scripts to Drive the LCD Screen -- Part Two: Downloading and Playing MP3s -- Installing a Media Player and Getting Music Files -- Writing a Jukebox Python Program -- Part Three: Controlling the Jukebox with Buttons -- Connecting the Buttons -- Adapting Your Jukebox Program to Include GPIO Buttons -- Part Four: Displaying Jukebox Information on the LCD Screen -- Finishing Up -- Appendix Where to Go from Here -- Websites -- Clubs -- Inspiring Projects and Tutorials -- Videos -- Books and Magazines -- Glossary -- Index -- EULA.…”
Full text (MFA users only)
Electronic eBook -
346
Convergence : the redesign of design
Published 2017Table of Contents: “…Challenges to Convergence ENDNOTES; IMAGES; CHAPTER 2 DATA AND INTUITION; A Look Back at the Data ; Quantitative vs. …”
Full text (MFA users only)
Electronic eBook -
347
The art of interpretation in an age of computation
Published 2017Full text (MFA users only)
Electronic eBook -
348
Bandwidth allocation for video under quality of service constraints
Published 2015Full text (MFA users only)
Electronic eBook -
349
Functional Applications of Text Analytics Systems
Published 2021Table of Contents: “…Non-Native Speakers -- 5.5.8 Virtual Reality and Augmented Reality -- 5.6 Test and Configuration -- 5.7 Summary -- 6: Learning -- 6.1 Introduction -- 6.1.1 Reading Order -- 6.1.2 Repurposing of Text -- 6.1.3 Philosophies of Learning -- 6.2 General Considerations -- 6.2.1 Metadata -- 6.2.2 Pathways of Learning -- 6.3 Machine Learning Aspects -- 6.3.1 Learning About Machine Learning -- 6.3.2 Machine Learning Constraints -- 6.4 Design/System Considerations -- 6.4.1 Do Not Use Machine Learning for the Sake of Using Machine Learning -- 6.4.2 Learning to Learn -- 6.4.3 Prediction Time -- 6.5 Applications/Examples -- 6.5.1 Curriculum Development -- 6.5.2 Customized Education Planning -- 6.5.3 Personalized Rehearsing -- 6.6 Test and Configuration -- 6.7 Summary -- 7: Testing and Configuration -- 7.1 Introduction -- 7.2 General Considerations -- 7.2.1 Data-Ops -- 7.2.2 Text Analytics and Immunological Data -- 7.2.3 Text Analytics and Cybersecurity -- 7.2.4 Data-Ops and Testing -- 7.3 Machine Learning Aspects -- 7.4 Design/System Considerations -- 7.5 Applications/Examples -- 7.6 Test and Configuration -- 7.7 Summary -- Index -- About the Author.…”
Full text (MFA users only)
Electronic eBook -
350
Data fusion support to activity-based intelligence
Published 2016Full text (MFA users only)
Electronic eBook -
351
-
352
Cyber-Risk Informatics : Engineering Evaluation with Data Science.
Published 2016Table of Contents: “…3.4 STOPPING RULE FOR TESTING IN THE TIME DOMAIN -- 3.5 DISCUSSIONS AND CONCLUSION -- 3.6 EXERCISES -- REFERENCES -- 4 SECURITY ASSESSMENT AND MANAGEMENT IN CYBER-RISK -- 4.1 INTRODUCTION -- 4.2 SECURITY METER (SM) MODEL DESIGN -- 4.3 VERIFICATION OF THE PROBABILISTIC SECURITY METER (SM) METHOD BY MONTE CARLO SIMULATION AND MATH-STATISTICAL TRIPLE-PRODUCT RULE -- 4.4 MODIFYING THE SM QUANTITATIVE MODEL FOR CATEGORICAL, HYBRID, AND NONDISJOINT DATA -- 4.5 MAINTENANCE PRIORITY DETERMINATION FOR 3 × 3 × 2 SM -- 4.6 PRIVACY METER (PM): HOW TO QUANTIFY PRIVACY BREACH…”
Full text (MFA users only)
Electronic eBook -
353
Basic data analysis for time series with R
Published 2014Table of Contents: “…Importing Data, --…”
Full text (MFA users only)
Electronic eBook -
354
Modern Methods to Covariance Estimation : With High-Dimensional Data.
Published 2013Table of Contents: “…3.10.1 The Incoherency Problem in Incomplete Longitudinal Data3.10.2 The Incomplete Data and The EM Algorithm; 3.11 A Data Example: Fruit Fly Mortality Rate; 3.12 Simulating Random Correlation Matrices; 3.13 Bayesian Analysis of Covariance Matrices; II COVARIANCE ESTIMATION: REGULARIZATION; 4 REGULARIZING THE EIGENSTRUCTURE; 4.1 Shrinking the Eigenvalues; 4.2 Regularizing The Eigenvectors; 4.3 A Duality between PCA and SVD; 4.4 Implementing Sparse PCA: A Data Example; 4.5 Sparse Singular Value Decomposition (SSVD); 4.6 Consistency of PCA; 4.7 Principal Subspace Estimation; 4.8 Further Reading.…”
Full text (MFA users only)
Electronic eBook -
355
Explorations in Computing : an Introduction to Computer Science.
Published 2010Full text (MFA users only)
Electronic eBook -
356
A-Life for music : music and computer models of living systems
Published 2011Table of Contents: “…A-Life for Music: Music and Computer Models of Living Systems; A-LIFE FOR MUSIC; Contents; List of Figures, Examples, and Tables; Preface; ONE Artificial Anuran Choruses; TWO Multi-Agent Modeling of Complex Rhythmic Interactions in Real- Time Performance; THREE Using Coevolution in Music Improvisation; FOUR Structural Coupling in a Society of Musical Agents; FIVE Transformation and Mapping of L-Systems Data in the Composition of a Large- Scale Piece of Music; SIX Generative Composition with Nodal; SEVEN Evolutionary Morphing for Music Composition; EIGHT The Evolving Drum Machine.…”
Full text (MFA users only)
Electronic eBook -
357
Proceedings of the 4th Asia-Pacific Bioinformatics Conference : Taipei, Taiwan, 13-16 February 2006
Published 2006Table of Contents: “…A Randomized Algorithm for Learning Mahalanobis Metrics:Application to Classification and Regression of Biological Data/…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
358
High Accuracy Computing Methods : Fluid Flows and Wave Phenomena
Published 2013Full text (MFA users only)
Electronic eBook -
359
Handbook of statistical analysis and data mining applications
Published 2009Table of Contents: “…Feature Selection -- Selecting the Best Variables -- Chapter 6: Accessory Tools and Advanced Features in Data -- PART II: -- The Algorithms in Data Mining and Text Mining, and the Organization of the Three most common Data Mining Tools -- Chapter 7. …”
Full text (MFA users only)
Electronic eBook -
360
Computational ecology : graphs, networks and agent-based modeling
Published 2012Table of Contents: “…Vertex connectivity; 3. Planarity Testing Algorithm; 4. Construct Graph from Interrelationship Data; 5. …”
Full text (MFA users only)
Electronic eBook