Search Results - (((((((ant OR arts) OR vian) OR data) OR cantor) OR anne) OR walted) OR wanting) algorithms.

  1. 381

    An introduction to statistical computing : a simulation-based approach by Voss, Jochen

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  2. 382

    Mathematical methods in computer aided geometric design II

    Published 1992
    Table of Contents: “…Box Spline Decomposition; 5. Data Reduction by Decomposition; References; Chapter 11. …”
    Full text (MFA users only)
    Electronic eBook
  3. 383

    Finding the Forest in the Trees : the Challenge of Combining Diverse Environmental Data. by Staff, National Research Council

    Published 1900
    Table of Contents: “…""VARIABLES MEASURED AND SOURCES OF DATA""""DATA MANAGEMENT AND INTERFACING""; ""Timeliness of Data Acquisition""; ""Accessibility of Data""; ""Data Quality and Verification""; ""Data Retention""; ""Data Documentation""; ""Importance of the Crop Calendar""; ""Definition of Users of Crop Modeling Results""; ""Creation of New Algorithms and Data Management Procedures""; ""Accommodation of Users' Needs for Crop Yield Estimates""; ""Interfacing of Disparate Databases""; ""Institutional and Political Constraints""; ""LESSONS LEARNED""; ""REFERENCES""…”
    Full text (MFA users only)
    Electronic eBook
  4. 384

    Knowledge discovery for business information systems

    Published 2001
    Table of Contents: “…Pruning Techniques and The FPM Algorithm -- 4. Metrics for Data Skewness and Workload Balance -- 5. …”
    Full text (MFA users only)
    Electronic eBook
  5. 385

    Deep Learning : From Big Data to Artificial Intelligence with R. by Tuffery, Stephane S.

    Published 2023
    Table of Contents: “…3.1 General -- 3.2 The Optimization Algorithms -- 3.3 Complexity Reduction and Penalized Regression -- 3.4 Ensemble Methods -- 3.4.1 Bagging -- 3.4.2 Random Forests -- 3.4.3 Extra-Trees -- 3.4.4 Boosting -- 3.4.5 Gradient Boosting Methods -- 3.4.6 Synthesis of the Ensemble Methods -- 3.5 Support Vector Machines -- 3.6 Recommendation Systems -- Notes -- Chapter 4 Natural Language Processing -- 4.1 From Lexical Statistics to Natural Language Processing -- 4.2 Uses of Text Mining and Natural Language Processing -- 4.3 The Operations of Textual Analysis -- 4.3.1 Textual Data Collection…”
    Full text (MFA users only)
    Electronic eBook
  6. 386
  7. 387

    Mathematics and computation in imaging science and information processing

    Published 2007
    Table of Contents: “…Further Reading; Acknowledgements; References; Data Hiding -- Theory and Algorithms Pierre Moulin and Ralf Koetter; 1. …”
    Full text (MFA users only)
    Electronic eBook
  8. 388

    Recent advances in hybrid metaheuristics for dataclustering

    Published 2020
    Table of Contents: “…1.9.2 PSO-Based Fuzzy Clustering -- 1.9.3 Ant Colony Optimization-Based Fuzzy Clustering -- 1.9.4 Artificial Bee Colony Optimization-Based Fuzzy Clustering -- 1.9.5 Differential Evolution-Based Fuzzy Clustering -- 1.9.6 Firefly Algorithm-Based Fuzzy Clustering -- 1.10 Conclusion -- References -- Chapter 2 Hybrid Harmony Search Algorithm to Solve the Feature Selection for Data Mining Applications -- 2.1 Introduction -- 2.2 Research Framework -- 2.3 Text Preprocessing -- 2.3.1 Tokenization -- 2.3.2 Stop Words Removal -- 2.3.3 Stemming -- 2.3.4 Text Document Representation…”
    Full text (MFA users only)
    Electronic eBook
  9. 389

    Programming the Finite Element Method. by Smith, I. M.

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  10. 390

    Apache Spark Quick Start Guide : Quickly Learn the Art of Writing Efficient Big Data Applications with Apache Spark. by Mehrotra, Shrey

    Published 2019
    Table of Contents: “…MicrobatchDStreams; Streaming architecture; Streaming example; Machine learning; MLlib; ML; Graph processing; GraphX; mapVertices; mapEdges; subgraph; GraphFrames; degrees; subgraphs; Graph algorithms; PageRank; Summary; Chapter 8: Spark Optimizations; Cluster-level optimizations; Memory; Disk; CPU cores; Project Tungsten; Application optimizations; Language choice; Structured versus unstructured APIs; File format choice; RDD optimizations; Choosing the right transformations; Serializing and compressing ; Broadcast variables; DataFrame and dataset optimizations; Catalyst optimizer; Storage…”
    Full text (MFA users only)
    Electronic eBook
  11. 391
  12. 392

    Can markets compute equilibria? by Monroe, Hunter K.

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  13. 393

    Heuristics in analytics : a practical perspective of what influences our analytical world by Reis Pinheiro, Carlos Andre, 1940-, McNeill, Fiona

    Published 2014
    Table of Contents: “…Chapter 3: The Heuristic Approach and Why We Use It Heuristics in Computing; Heuristic Problem-Solving Methods; Genetic Algorithms: A Formal Heuristic Approach; Foundation of Genetic Algorithms; Initialization; Selection; Reproduction; Termination; Pseudo-Code Algorithm; Benefits of Genetic Algorithms; Influences in Competitive Industries; Genetic Algorithms Solving Business Problems; Summary; Chapter 4: The Analytical Approach; Introduction to Analytical Modeling; The Competitive-Intelligence Cycle; Data; Information; Knowledge; Intelligence; Experience; Summary.…”
    Full text (MFA users only)
    Electronic eBook
  14. 394
  15. 395

    Computational Approaches in Cheminformatics and Bioinformatics. by Guha, Rajarshi

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  16. 396

    Cryptography 101 : From Theory to Practice. by Oppliger, Rolf

    Published 2021
    Table of Contents: “…Intro -- Cryptography 101: From Theory to Practice -- Contents -- Foreword -- Preface -- References -- Acknowledgments -- Chapter 1 Introduction -- 1.1 CRYPTOLOGY -- 1.2 CRYPTOGRAPHIC SYSTEMS -- 1.2.1 Classes of Cryptographic Systems -- 1.2.2 Secure Cryptographic Systems -- 1.3 HISTORICAL BACKGROUND INFORMATION -- 1.4 OUTLINE OF THE BOOK -- References -- Chapter 2 Cryptographic Systems -- 2.1 UNKEYED CRYPTOSYSTEMS -- 2.1.1 Random Generators -- 2.1.2 Random Functions -- 2.1.3 One-Way Functions -- 2.1.4 Cryptographic Hash Functions -- 2.2 SECRET KEY CRYPTOSYSTEMS -- 2.2.1 Pseudorandom Generators -- 2.2.2 Pseudorandom Functions -- 2.2.3 Symmetric Encryption -- 2.2.4 Message Authentication -- 2.2.5 Authenticated Encryption -- 2.3 PUBLIC KEY CRYPTOSYSTEMS -- 2.3.1 Key Establishment -- 2.3.2 Asymmetric Encryption Systems -- 2.4 FINAL REMARKS -- References -- Part I UNKEYEDC RYPTOSYSTEMS -- Chapter 3 Random Generators -- 3.1 INTRODUCTION -- 3.2 REALIZATIONS AND IMPLEMENTATIONS -- 3.2.1 Hardware-Based Random Generators -- 3.2.2 Software-Based Random Generators -- 3.2.3 Deskewing Techniques -- 3.3 STATISTICAL RANDOMNESS TESTING -- References -- Chapter 4 Random Functions -- 4.1 INTRODUCTION -- 4.2 IMPLEMENTATION -- 4.3 FINAL REMARKS -- Chapter 5 One-Way Functions -- 5.1 INTRODUCTION -- 5.2 CANDIDATE ONE-WAY FUNCTIONS -- 5.2.1 Discrete Exponentiation Function -- 5.2.2 RSA Function -- 5.2.3 Modular Square Function -- 5.3 INTEGER FACTORIZATION ALGORITHMS -- 5.3.1 Special-Purpose Algorithms -- 5.3.2 General-Purpose Algorithms -- 5.3.3 State of the Art -- 5.4 ALGORITHMS FOR COMPUTING DISCRETE LOGARITHMS -- 5.4.1 Generic Algorithms -- 5.4.2 Nongeneric (Special-Purpose) Algorithms -- 5.4.3 State of the Art -- 5.5 ELLIPTIC CURVE CRYPTOGRAPHY -- 5.6 FINAL REMARKS -- References -- Chapter 6 Cryptographic Hash Functions -- 6.1 INTRODUCTION.…”
    Full text (MFA users only)
    Electronic eBook
  17. 397

    Computing : a Historical and Technical Perspective. by Igarashi, Yoshihide

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  18. 398
  19. 399

    Learning Geospatial Analysis with Python - Second Edition. by Lawhead, Joel

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  20. 400

    An introduction to computational engineering with Matlab by Yang, Xin-She

    Published 2006
    Full text (MFA users only)
    Electronic eBook