Search Results - (((((((ant OR arts) OR wikan) OR data) OR cantor) OR anne) OR walted) OR wanting) algorithms.

  1. 181

    Engineering an Algorithm for Reducing Variation in Manufacturing Processes. by Steiner, Stefan H.

    Published 2004
    Table of Contents: “…Material on Enclosed CD-ROM; Figures and Tables; Acknowledgments; Preface; 1 Introduction; PART I Setting the Stage; 2 Describing Processes; 3 Seven Approaches to Variation Reduction; 4 An Algorithm for Reducing Variation; 5 Obtaining Process Knowledge Empirically; PART II Getting Started; 6 Defining a Focused Problem; 7 Checking the Measurement System; 8 Choosing a Working Variation Reduction Approach; PART III Finding a Dominant Cause of Variation; 9 Finding a Dominant Cause Using the Method of Elimination; 10 Investigations to Compare Two Families of Variation.…”
    Full text (MFA users only)
    Electronic eBook
  2. 182

    Smoothing of multivariate data : density estimation and visualization by Klemelä, Jussi, 1965-

    Published 2009
    Table of Contents: “…Smoothing of Multivariate Data: Density Estimation and Visualization; CONTENTS; Preface; Introduction; PART I VISUALIZATION; PART II ANALYTICAL AND ALGORITHMIC TOOLS; PART III TOOLBOX OF DENSITY ESTIMATORS; Appendix A: Notations; Appendix B: Formulas; Appendix C: The Parent-Child Relations in a Mode Graph; Appendix D: Trees; Appendix E: Proofs; Problem Solutions; References; Author Index; Topic Index.…”
    Full text (MFA users only)
    Electronic eBook
  3. 183
  4. 184

    Algorithmic information theory for physicists and natural scientists by Devine, Sean

    Published 2020
    Table of Contents: “…Some approaches to complex or organised systems -- 1.4. Algorithmic information theory (AIT) -- 1.5. Algorithmic information theory and mathematics -- 1.6. …”
    Full text (MFA users only)
    Electronic eBook
  5. 185

    Digital Data Access. by Chamoux, Jean-Pierre

    Published 2018
    Table of Contents: “…Representations of communities and massive dataConstraints of mathematization; Exploiting existing data; The notion of the invariant: perspective, vectorial, linear algebra and matrix representation; Graphs, their calculations and some algorithms; Conclusion; Bibliography; 3. …”
    Full text (MFA users only)
    Electronic eBook
  6. 186

    Applied data analytics : principles and applications by Agbinya, Johnson I.

    Published 2020
    Table of Contents: “…Markov Chain and its Applications -- Hidden Markov Modelling (HMM) -- Introduction to Kalman Filters -- Kalman Filters II -- Genetic Algorithm -- Calculus on Computational Graphs -- Support Vector Machines -- Artificial Neural Networks -- Training of Neural Networks -- Recurrent Neural Networks -- Convolutional Neural Networks -- Principal Component Analysis -- Moment-Generating Functions -- Characteristic Functions -- Probability-Generating Functions -- Digital Identity Management System Using Neural Networks -- Probabilistic Neural Networks Classifiers for IoT Data Classification -- MML Learning and Inference of Hierarchical Probabilistic Finite State Machines.…”
    Full text (MFA users only)
    Electronic eBook
  7. 187
  8. 188

    Data mining techniques : for marketing, sales, and customer relationship management by Berry, Michael J. A.

    Published 2004
    Table of Contents: “…Why and what is data mining? -- The virtuous cycle of data mining -- Data mining methodology and best practices -- Data mining applications in marketing and customer relationship management -- The lure of statistics : data mining using familiar tools -- Decision trees -- Artificial neural networks -- Nearest neighbor approaches : memory-based reasoning and collaborative filtering -- Market basket analysis and association rules -- Link analysis -- Automatic cluster detection -- Knowing when to worry : hazard functions and survival analysis in marketing -- Genetic algorithms -- Data mining throughout the customer life cycle -- Data warehousing, OLAP, and data mining -- Building the data mining environment -- Preparing data for mining -- Putting data mining to work.…”
    Full text (MFA users only)
    Electronic eBook
  9. 189

    Music data mining

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  10. 190

    Data mining techniques : for marketing, sales, and customer relationship management by Linoff, Gordon, Berry, Michael J. A.

    Published 2011
    Table of Contents: “…What Is data mining and why do it? -- Data mining applications in marketing and customer relationship management -- The data mining process -- Statistics 101: What you should know about data -- Descriptions and prediction: profiling and predictive modeling -- Data mining using classic statistical techniques -- Decision trees -- Artificail neural networks -- Nearest neighbor approaches: Memory-based reasoning and collaborative filtering -- Knowing when to worry: Using survival analysis to understand customers -- Genetic algorithms and swarm intelligence -- Tell me something new: Pattern discovery and data mining -- Finding islands of similarity: Automatic cluster detection -- Alternative approaches to cluster detection -- Market basket analysis and association rules -- Link analysis -- Data warehousing, OLAP, analytic sandboxes, and data mining -- Building customer signatures -- Derived variables: Making the data mean more -- Too much of a good thing? …”
    Full text (MFA users only)
    Electronic eBook
  11. 191
  12. 192
  13. 193

    Principles of data integration by Doan, AnHai

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  14. 194

    Discovering knowledge in data : an introduction to data mining by Larose, Daniel T.

    Published 2014
    Table of Contents: “…-- 1.2 Wanted: Data Miners -- 1.3 The Need for Human Direction of Data Mining -- 1.4 The Cross-Industry Standard Practice for Data Mining -- 1.4.1 Crisp-DM: The Six Phases -- 1.5 Fallacies of Data Mining -- 1.6 What Tasks Can Data Mining Accomplish? …”
    Full text (MFA users only)
    Electronic eBook
  15. 195

    Practical data analysis by Cuesta, Hector

    Published 2013
    Table of Contents: “…Numeric facetsTransforming data; Exporting data; Operation history; Summary; Chapter 3:Data Visualization; Data-Driven Documents (D3); HTML; DOM; CSS; JavaScript; SVG; Getting started with D3.js; Bar chart; Pie chart; Scatter plot; Single line chart; Multi-line chart; Interaction and animation; Summary; Chapter 4:Text Classification; Learning and classification; Bayesian classification; Naïve Bayes algorithm; E-mail subject line tester; The algorithm; Classifier accuracy; Summary; Chapter 5:Similarity-based Image Retrieval; Image similarity search; Dynamic time warping (DTW).…”
    Full text (MFA users only)
    Electronic eBook
  16. 196

    Pharmaceutical data mining : approaches and applications for drug discovery

    Published 2010
    Table of Contents: “…Livingstone and John Bradshaw -- Drug gold and data dragons : myths and realities of data mining in the pharmaceutical industry / Barry Robson and Andy Vaithiligam -- Application of data mining algorithms in pharmaceutical research and development / Konstantin V. …”
    Full text (MFA users only)
    Electronic eBook
  17. 197

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
    Full text (MFA users only)
    Electronic eBook
  18. 198

    Big data analytics : turning big data into big money by Ohlhorst, Frank, 1964-

    Published 2013
    Table of Contents: “…Processing PowerChoosing among In-house, Outsourced, or Hybrid Approaches; Chapter 7: Security, Compliance, Auditing, and Protection; Pragmatic Steps to Securing Big Data; Classifying Data; Protecting Big Data Analytics; Big Data and Compliance; The Intellectual Property Challenge; Chapter 8: The Evolution of Big Data; Big Data: The Modern Era; Today, Tomorrow, and the Next Day; Changing Algorithms; Chapter 9: Best Practices for Big Data Analytics; Start Small with Big Data; Thinking Big; Avoiding Worst Practices; Baby Steps; The Value of Anomalies; Expediency versus Accuracy.…”
    Full text (MFA users only)
    Electronic eBook
  19. 199

    Smart data pricing

    Published 2014
    Table of Contents: “…4.1 Introduction4.2 Pricing Under Demand Flexibilities -- 4.3 Pricing Under Predictable Demand -- References -- Chapter 5: Dual Pricing Algorithms by Wireless Network Duality for Utility Maximization -- 5.1 Introduction -- 5.2 Utility Maximization -- 5.3 The Wireless Network Duality -- 5.4 Numerical Examples -- 5.5 Conclusion -- References -- Chapter 6: Human Factors in Smart Data Pricing -- 6.1 Introduction -- 6.2 Methodology -- 6.3 Hci Lessons From the Energy Market -- 6.4 User Psychology in Home Networks -- 6.5 User Psychology in Bandwidth Pricing…”
    Full text (MFA users only)
    Electronic eBook
  20. 200