Search Results - (((((((ant OR granting) OR ken) OR wante) OR cantor) OR anne) OR maarten) OR hands) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 35
- Machine learning 35
- Artificial intelligence 34
- Mathematical models 24
- artificial intelligence 24
- Mathematics 20
- Data mining 19
- Python (Computer program language) 18
- Mathematical optimization 17
- Artificial Intelligence 15
- Algorithms 13
- methods 13
- Development 12
- Neural networks (Computer science) 12
- Application software 11
- Computer networks 10
- Computer security 10
- Machine Learning 10
- Technological innovations 10
- algorithms 10
- Digital techniques 9
- Signal processing 9
- Design and construction 8
- Diseases 8
- Security measures 8
- Social aspects 8
- Data Mining 7
- Information technology 7
- Neural Networks, Computer 7
- R (Computer program language) 7
Search alternatives:
- ant »
- granting »
- wante »
- cantor »
-
21
Practical Algorithms for 3D Computer Graphics, Second Edition.
Published 2013Full text (MFA users only)
Electronic eBook -
22
Hands-On Cryptography with Python : Leverage the Power of Python to Encrypt and Decrypt Data.
Published 2018Full text (MFA users only)
Electronic eBook -
23
-
24
-
25
Simple adaptive strategies : from regret-matching to uncoupled dynamics
Published 2013Full text (MFA users only)
Electronic eBook -
26
Data Structure and Algorithms Using C++ : A Practical Implementation.
Published 2021Table of Contents: “…4.8 Inline Member Function -- 4.9 Friend Function -- 4.9.1 Simple Friend Function -- 4.9.2 Friend With Inline Substitution -- 4.9.3 Granting Friendship to Another Class (Friend Class) -- 4.9.4 More Than One Class Having the Same Friend Function -- 4.10 Static Data Member and Member Functions -- 4.11 Constructor and Destructor -- 4.11.1 Constructor -- 4.11.2 Destructor -- 4.12 Dynamic Memory Allocation -- 4.13 This Pointer -- 4.14 Class Within Class -- 4.15 Questions -- 5 Stack -- 5.1 STACK -- 5.2 Operations Performed With STACK -- 5.3 ALGORITHMS -- 5.4 Applications of STACK…”
Full text (MFA users only)
Electronic eBook -
27
Network and discrete location : models, algorithms, and applications
Published 2013Full text (MFA users only)
Electronic eBook -
28
-
29
-
30
-
31
A Hands-On Guide to Designing Embedded Systems.
Published 2021Table of Contents: “…-- 3.7 Finite State Machine Design -- 3.7.1 Defining a State Machine -- 3.7.2 Algorithmic State Diagrams -- 3.7.3 Moore or Mealy: What Should I Choose? …”
Full text (MFA users only)
Electronic eBook -
32
Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow.
Published 2018Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
Full text (MFA users only)
Electronic eBook -
33
-
34
-
35
-
36
-
37
-
38
Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
Published 2019Table of Contents: “…; Useful keyboard shortcuts; Choose your notebook kernel; Getting your hands dirty; Installing DL libraries; Deep learning pros and cons for cybersecurity; TensorFlow; Keras…”
Full text (MFA users only)
Electronic eBook -
39
Meta-heuristic and evolutionary algorithms for engineering optimization
Published 2017Table of Contents: “…Overview of optimization -- Introduction to meta-heuristic and evolutionary algorithms -- Pattern search (PS) -- Genetic algorithm (GA) -- Simulated annealing (SA) -- Tabu search (TS) -- Ant colony optimization (ACO) -- Particle swarm optimization (PSO) -- Differential evolution (DE) -- Harmony search (HS) -- Shuffled frog-leaping algorithm (SFLA) -- Honey-bee mating optimization (HBMO) -- Invasive weed optimization (IWO) -- Central force optimization (CFO) -- Biogeography-based optimization (BBO) -- Firefly algorithm (FA) -- Gravity search algorithm (GSA) -- Bat algorithm (BA) -- Plant propagation algorithm (PPA) -- Water cycle algorithm (WCA) -- Symbiotic organisms search (SOS) -- Comprehensive evolutionary algorithm (CEA).…”
Full text (MFA users only)
Electronic eBook -
40
Reconstructive surgery of the hand and upper extremity
Published 2018Table of Contents: “…Dorsal Soft Tissue Injury to Finger and Hand -- 24. Volar Soft Tissue Injury to Finger and Hand/Palm -- 25. …”
Full text (MFA users only)
Electronic eBook