Search Results - (((((((ant OR giant) OR mantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 45
- Artificial intelligence 42
- Mathematics 40
- Mathematical models 35
- Mathematical optimization 26
- artificial intelligence 26
- Algorithms 25
- Machine learning 25
- algorithms 23
- Social aspects 18
- Artificial Intelligence 17
- Data mining 17
- Technological innovations 17
- Computer networks 16
- Computer algorithms 14
- History 14
- Statistical methods 13
- Digital techniques 12
- Information technology 12
- Research 12
- methods 12
- Design and construction 11
- Image processing 11
- Python (Computer program language) 11
- Big data 10
- Development 10
- Diseases 10
- Engineering 10
- Neural networks (Computer science) 10
- Application software 9
Search alternatives:
- ant »
- giant »
- mantic »
- cantor »
-
41
Algorithmic Graph Theory and Perfect Graphs.
Published 2014Table of Contents: “…The Design of Efficient Algorithms; 1. The Complexity of Computer Algorithms; 2. …”
Full text (MFA users only)
Electronic eBook -
42
-
43
Network and discrete location : models, algorithms, and applications
Published 2013Full text (MFA users only)
Electronic eBook -
44
3D Shape Analysis : Fundamentals, Theory and Applications.
Published 2018Table of Contents: “…9.6 Summary and Further Reading10 3D Face Recognition; 10.1 Introduction; 10.2 3D Face Recognition Tasks, Challenges and Datasets; 10.3 3D Face Recognition Methods; 10.4 Summary; 11 Object Recognition in 3D Scenes; 11.1 Introduction; 11.2 Surface Registration-Based Object Recognition Methods; 11.3 Machine Learning-Based Object Recognition Methods; 11.4 Summary and Further Reading; 12 3D Shape Retrieval; 12.1 Introduction; 12.2 Benchmarks and Evaluation Criteria; 12.3 Similarity Measures; 12.4 3D Shape Retrieval Algorithms; 12.5 Summary and Further Reading; 13 Cross-domain Retrieval…”
Full text (MFA users only)
Electronic eBook -
45
Computer and machine vision : theory, algorithms, practicalities
Published 2012Full text (MFA users only)
Electronic eBook -
46
Inverse Synthetic Aperture Radar Imaging with MATLAB Algorithms.
Published 2021Full text (MFA users only)
Electronic eBook -
47
Meta-heuristic and evolutionary algorithms for engineering optimization
Published 2017Table of Contents: “…Overview of optimization -- Introduction to meta-heuristic and evolutionary algorithms -- Pattern search (PS) -- Genetic algorithm (GA) -- Simulated annealing (SA) -- Tabu search (TS) -- Ant colony optimization (ACO) -- Particle swarm optimization (PSO) -- Differential evolution (DE) -- Harmony search (HS) -- Shuffled frog-leaping algorithm (SFLA) -- Honey-bee mating optimization (HBMO) -- Invasive weed optimization (IWO) -- Central force optimization (CFO) -- Biogeography-based optimization (BBO) -- Firefly algorithm (FA) -- Gravity search algorithm (GSA) -- Bat algorithm (BA) -- Plant propagation algorithm (PPA) -- Water cycle algorithm (WCA) -- Symbiotic organisms search (SOS) -- Comprehensive evolutionary algorithm (CEA).…”
Full text (MFA users only)
Electronic eBook -
48
Algorithms for sample preparation with microfluidic lab-on-chip
Published 2019Table of Contents: “…2.1.3 Generation of Dilution Gradients2.2 Mixing Algorithms for DMFB; 2.3 Droplet Streaming Algorithms; 2.4 Dilution and Mixing Algorithms for CFMB; 2.5 Summary; Chapter 3 -- Multiple Dilution Sample Preparation on Digital Microfluidic Biochips; 3.1 Related Work; 3.2 Tree-pruning-based Dilution Algorithm; 3.2.1 Proposed Methodology; 3.3 Experimental Results; 3.4 Conclusions; Chapter 4 -- Efficient Generation of Dilution Gradients with Digital Microfluidic Biochips; 4.1 Literature Review; 4.2 Linear Gradient; 4.3 Exponential Gradient; 4.4 Complex-shaped Gradients…”
Full text (MFA users only)
Electronic eBook -
49
Building software for simulation : theory and algorithms, with applications in C++
Published 2011Full text (MFA users only)
Electronic eBook -
50
Genetic and evolutionary computation : medical applications
Published 2010Table of Contents: “…Potok -- Towards an alternative to magnetic resonance imaging for vocal tract shape measurement using the principles of evolution / David M. …”
Full text (MFA users only)
Electronic eBook -
51
-
52
An Investigation into Authentication Security of GSM algorithm for Mobile Banking.
Published 2014Full text (MFA users only)
Electronic eBook -
53
-
54
-
55
Freudian unconscious and cognitive neuroscience : from unconscious fantasies to neural algorithms
Published 2009Full text (MFA users only)
Electronic eBook -
56
What to Do When Machines Do Everything : Five Ways Your Business Can Thrive in an Economy of Bots, AI, and Data.
Published 2017Table of Contents: “…What to Do When Machines Do Everything: How to Get Ahead in a World of AI, Algorithms, Bots, and Big Data; Contents; Preface; 1: When Machines Do Everything; Like It or Not, This Is Happening; Digital That Matters; Playing the New Game; But Will I Be Automated Away?…”
Full text (MFA users only)
Electronic eBook -
57
A guide to creating a successful algorithmic trading strategy
Published 2016Full text (MFA users only)
Electronic eBook -
58
Automating open source intelligence : algorithms for OSINT
Published 2016Table of Contents: “…Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 -- Ethical Considerations When Using Online Datasets for Research Purposes; Introduction.…”
Full text (MFA users only)
Electronic eBook -
59
Bayesian phylogenetics : methods, algorithms, and applications
Published 2014Table of Contents: “…Front Cover; Contents; List of Figures; List of Tables; Preface; Editors; Contributors; Chapter 1: Bayesian phylogenetics: methods, computational algorithms, and applications; Chapter 2: Priors in Bayesian phylogenetics; Chapter 3: Inated density ratio (IDR) method for estimating marginal likelihoods in Bayesian phylogenetics; Chapter 4: Bayesian model selection in phylogenetics and genealogy-based population genetics; Chapter 5: Variable tree topology stepping-stone marginal likelihood estimation; Chapter 6: Consistency of marginal likelihood estimation when topology varies.…”
Full text (MFA users only)
Electronic eBook -
60
Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto.
Published 2019Table of Contents: “…59 -- Cryptography Basics 59 -- Encryption 59 -- Integrity Hashing 72 -- Cryptographic Uses 73 -- How Quantum Computers Can Break Cryptography 74 -- Cutting Time 74 -- Quantum Algorithms 76 -- What Quantum Can and Can’t Break 79 -- Still Theoretical 82 -- Summary 83 -- 4 When Will the Quantum Crypto Break Happen? …”
Full text (MFA users only)
Electronic eBook