Search Results - (((((((ant OR canton) OR span) OR wants) OR cantor) OR anne) OR carter) OR wanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 25
- Artificial intelligence 24
- Machine learning 19
- Mathematical optimization 18
- Mathematics 18
- Data mining 16
- artificial intelligence 15
- Mathematical models 13
- Algorithms 10
- Artificial Intelligence 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- methods 10
- Application software 9
- Computer networks 9
- Development 9
- algorithms 9
- Data Mining 7
- Graph theory 7
- Machine Learning 7
- Bioinformatics 6
- Design and construction 6
- Information technology 6
- R (Computer program language) 6
- Technological innovations 6
- Computational biology 5
- Computer programming 5
- Computer security 5
- Computer simulation 5
- Electronic data processing 5
Search alternatives:
- ant »
- canton »
- wants »
- cantor »
- wanting »
- span »
-
261
Concise dictionary of engineering : a guide to the language of engineering
Published 2014Full text (MFA users only)
Electronic eBook -
262
-
263
IBM TotalStorage : SAN product, design, and optimization guide
Published 2005Table of Contents: “…3.2.8 Communication -- 3.3 Buffers -- 3.4 Addressing -- 3.4.1 World Wide Name -- 3.4.2 WWN and WWPN -- 3.4.3 24-bit port address -- 3.4.4 Loop address -- 3.4.5 FICON addressing -- 3.5 Fabric services -- 3.5.1 Management services -- 3.5.2 Time services -- 3.5.3 Name services -- 3.5.4 Login services -- 3.5.5 Registered State Change Notification -- 3.6 Logins -- 3.6.1 Fabric login -- 3.6.2 Port login -- 3.6.3 Process login -- 3.7 Path routing mechanisms -- 3.7.1 Spanning tree -- 3.7.2 Fabric Shortest Path First -- 3.7.3 What is FSPF? …”
Full text (MFA users only)
Electronic eBook -
264
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
Full text (MFA users only)
Electronic eBook -
265
-
266
Nuclear Medicine Imaging: An Encyclopedic Dictionary
Published 2012Full text (MFA users only)
Electronic eBook -
267
-
268
-
269
Handbook of modeling high-frequency data in finance
Published 2012Full text (MFA users only)
Electronic eBook -
270
Understanding smart sensors
Published 2013Table of Contents: “…ZigBee-Like Wireless -- 8.3.3. ANT+ -- 8.3.4.6LoWPAN -- 8.3.5. Near Field Communication (NFC) -- 8.3.6.Z-Wave -- 8.3.7. …”
Full text (MFA users only)
Electronic eBook -
271
Software engineering for embedded systems : methods, practical techniques, and applications
Published 2013Table of Contents: “…-- Examples of modeling languages -- The V diagram promise -- So, why would you want to model your embedded system? -- When should you model your embedded system? …”
Full text (MFA users only)
Electronic eBook -
272
The IoT Architect's Guide to Attainable Security & Privacy
Published 2020Full text (MFA users only)
Electronic eBook -
273
Networks-on-chip : from implementations to programming paradigms
Published 2014Full text (MFA users only)
Electronic eBook -
274
Millimeter-wave digitally intensive frequency generation in CMOS
Published 2015Full text (MFA users only)
Electronic eBook -
275
XML for DB2 information integration
Published 2004Table of Contents: “…-- 3.4 Creating an XML schema from a database schema -- 3.4.1 The algorithm.…”
Full text (MFA users only)
Electronic eBook -
276
-
277
-
278
Visual Inspection Technology in the Hard Disc Drive Industry.
Published 2015Table of Contents: “…Introduction / Suchart Yammen / Paisarn Muneesawang -- 1.2. Algorithm for corrosion detection / Suchart Yammen / Paisarn Muneesawang -- 1.2.1. …”
Full text (MFA users only)
Electronic eBook -
279
Fundamentals of Fluid Power Control.
Published 2009Table of Contents: “…Control-Volume Flow Continuity -- PRV Flow -- Force Balance at the Spindle -- 5.13.3 Frequency Response from a Linearized Transfer Function Analysis -- 5.14 Servovalve Dynamics -- First-Stage, Armature, and Flapper-Nozzle -- Flapper-Nozzle and Resistance Bridge Flow Characteristic -- Force Balance at the Spool -- 5.15 An Open-Loop Servovalve-Motor Drive with Line Dynamics Modeled by Lumped Approximations -- Servovalve, Dynamics Included, Underlapped Spool -- Lines, Laminar Mean Flow, Two Lump Approximations per Line, Negligible Motor Internal Volume -- Motor Flow and Torque Equations -- 5.16 Transmission Line Dynamics -- 5.16.1 Introduction -- Servovalve-Cylinder with Short Lines and Significant Actuator Volumes -- Servovalve-Motor with Long Lines and Negligible Actuator Volumes -- 5.16.2 Lossless Line Model for Z and Y -- 5.16.3 Average and Distributed Line Friction Models for Z and Y -- 5.16.4 Frequency-Domain Analysis -- 5.16.5 Servovalve-Reflected Linearized Coefficients -- 5.16.6 Modeling Systems with Nonlossless Transmission Lines, the Modal Analysis Method -- 5.16.7 Modal Analysis Applied to a Servovalve-Motor Open-Loop Drive -- 5.17 The State-Space Method for Linear Systems Modeling -- 5.17.1 Modeling Principles -- 5.17.2 Some Further Aspects of the Time-Domain Solution -- 5.17.3 The Transfer Function Concept in State Space -- 5.18 Data-Based Dynamic Modeling -- 5.18.1 Introduction -- 5.18.2 Time-Series Modeling -- 5.18.3 The Group Method of Data Handling (GMDH) Algorithm -- 5.18.4 Artificial Neural Networks -- 5.18.5 A Comparison of Time-Series, GMDH, and ANN Modeling of a Second-Order Dynamic System -- 5.18.6 Time-Series Modeling of a Position Control System -- 5.18.7 Time-Series Modeling for Fault Diagnosis -- 5.18.8 Time-Series Modeling of a Proportional PRV -- 5.18.9 GMDH Modeling of a Nitrogen-Filled Accumulator.…”
Full text (MFA users only)
Electronic eBook -
280
The next economic disaster : why it's coming and how to avoid it
Published 2014Full text (MFA users only)
Electronic eBook