Search Results - (((((((ant OR hands) OR planting) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 42
- Artificial intelligence 39
- Mathematical models 34
- Machine learning 33
- Mathematics 28
- artificial intelligence 24
- Algorithms 22
- Mathematical optimization 22
- algorithms 19
- Data mining 18
- Computer networks 17
- Technological innovations 17
- methods 15
- Artificial Intelligence 14
- Information technology 14
- Management 14
- Computer algorithms 13
- Big data 12
- Development 11
- Digital techniques 11
- Neural networks (Computer science) 11
- Signal processing 11
- Application software 10
- Python (Computer program language) 10
- Bioinformatics 9
- Computer security 9
- Design and construction 9
- Diseases 9
- Machine Learning 9
- Security measures 9
Search alternatives:
- ant »
- planting »
- markant »
- cantor »
-
41
A Hands-On Guide to Designing Embedded Systems.
Published 2021Table of Contents: “…-- 3.7 Finite State Machine Design -- 3.7.1 Defining a State Machine -- 3.7.2 Algorithmic State Diagrams -- 3.7.3 Moore or Mealy: What Should I Choose? …”
Full text (MFA users only)
Electronic eBook -
42
Hands-On Artificial Intelligence for IoT : Expert Machine Learning and Deep Learning Techniques for Developing Smarter IoT Systems.
Published 2019Table of Contents: “…The convolution layerPooling layer; Some popular CNN model; LeNet to recognize handwritten digits; Recurrent neural networks; Long short-term memory; Gated recurrent unit; Autoencoders; Denoising autoencoders; Variational autoencoders; Summary; Chapter 5: Genetic Algorithms for IoT; Optimization; Deterministic and analytic methods; Gradient descent method; Newton-Raphson method; Natural optimization methods; Simulated annealing; Particle Swarm Optimization; Genetic algorithms; Introduction to genetic algorithms; The genetic algorithm; Crossover; Mutation; Pros and cons; Advantages…”
Full text (MFA users only)
Electronic eBook -
43
Sharing economy and big data analytics
Published 2020Table of Contents: “…The Sharing Economy or the Emergence of a New Business Model. …”
Full text (MFA users only)
Electronic eBook -
44
Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow.
Published 2018Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
Full text (MFA users only)
Electronic eBook -
45
-
46
-
47
-
48
-
49
Meta-heuristic and evolutionary algorithms for engineering optimization
Published 2017Table of Contents: “…Overview of optimization -- Introduction to meta-heuristic and evolutionary algorithms -- Pattern search (PS) -- Genetic algorithm (GA) -- Simulated annealing (SA) -- Tabu search (TS) -- Ant colony optimization (ACO) -- Particle swarm optimization (PSO) -- Differential evolution (DE) -- Harmony search (HS) -- Shuffled frog-leaping algorithm (SFLA) -- Honey-bee mating optimization (HBMO) -- Invasive weed optimization (IWO) -- Central force optimization (CFO) -- Biogeography-based optimization (BBO) -- Firefly algorithm (FA) -- Gravity search algorithm (GSA) -- Bat algorithm (BA) -- Plant propagation algorithm (PPA) -- Water cycle algorithm (WCA) -- Symbiotic organisms search (SOS) -- Comprehensive evolutionary algorithm (CEA).…”
Full text (MFA users only)
Electronic eBook -
50
Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
Published 2019Table of Contents: “…; Useful keyboard shortcuts; Choose your notebook kernel; Getting your hands dirty; Installing DL libraries; Deep learning pros and cons for cybersecurity; TensorFlow; Keras…”
Full text (MFA users only)
Electronic eBook -
51
Uberland : how algorithms are rewriting the rules of work
Published 2018Table of Contents: “…Introduction : using an app to go to work-Uber as a symbol of the new economy -- Workers as digital pawns : how Uber uses the sharing economy to exploit everyone -- Motivations to drive : how Uber creates jobs for many at the expense of a few -- Grandiose promises : how Uber proposes entrepreneurship to the masses -- The shady middleman : how Uber plays broker to line its pockets -- Behind the curtain : how Uber rules drivers with algorithms -- In the big leagues : how Uber plays ball -- Conclusion : the new age of Uber-how technology consumption rewrote the rules of work -- Appendix 1. methodology : how I studied Uber -- Appendix 2. ridehailing beyond Uber : meet Lyft, the younger twin.…”
Full text (MFA users only)
Electronic eBook -
52
Diffuse algorithms for neural and neuro-fuzzy networks : with applications in control engineering and signal processing
Published 2017Table of Contents: “…Front Cover; Diffuse Algorithms for Neural and Neuro-Fuzzy Networks; Copyright Page; Contents; List of Figures; List of Tables; Preface; 1 Introduction; 1.1 Separable Models of Plants and Training Problems Associated With Them; 1.1.1 Separable Least Squares Method; 1.1.2 Perceptron With One Hidden Layer; 1.1.3 Radial Basis Neural Network; 1.1.4 Neuro-Fuzzy Network; 1.1.5 Plant Models With Time Delays; 1.1.6 Systems With Partly Unknown Dynamics; 1.1.7 Recurrent Neural Network; 1.1.8 Neurocontrol; 1.2 The Recursive Least Squares Algorithm With Diffuse and Soft Initializations.…”
Full text (MFA users only)
Electronic eBook -
53
Algorithmic and artificial intelligence methods for protein bioinformatics
Published 2014Full text (MFA users only)
Electronic eBook -
54
Reconstructive surgery of the hand and upper extremity
Published 2018Table of Contents: “…Dorsal Soft Tissue Injury to Finger and Hand -- 24. Volar Soft Tissue Injury to Finger and Hand/Palm -- 25. …”
Full text (MFA users only)
Electronic eBook -
55
Fundamentals of grid computing : theory, algorithms and technologies
Published 2010Table of Contents: “…Cover; Title; Copyright; Contents; List of Figures; List of Tables; Foreword; Preface; Chapter 1: Grid computing overview; Chapter 2: Synchronization protocols for sharing resources in grid environments; Chapter 3: Data replication in grid environments; Chapter 4: Data management in grids; Chapter 5: Future of grids resources management; Chapter 6: Fault-tolerance and availability awareness in computational grids; Chapter 7: Fault tolerance for distributed scheduling in grids; Chapter 8: Broadcasting for grids; Chapter 9: Load balancing algorithms for dynamic networks.…”
Full text (MFA users only)
Electronic eBook -
56
Between stillness and motion : film, photography, algorithms
Published 2011Full text (MFA users only)
Electronic eBook -
57
Machine learning : hands-on for developers and technical professionals
Published 2020Full text (MFA users only)
Electronic eBook -
58
Deep learning with Python : a hands-on introduction
Published 2017Table of Contents: “…Stochastic; Challenges with SGD; Local Minima; Saddle Points; Selecting the Learning Rate; Slow Progress in Narrow Valleys; Algorithmic Variations on SGD; Momentum.…”
Full text (MFA users only)
Electronic eBook -
59
-
60
Algorithmic problems of group theory, their complexity, and applications to cryptography
Published 2015Table of Contents: “…Formal Definition -- 3. Shamirâ€?s Secret Sharing Scheme -- 4. Secret Sharing Using Non-commutative Groups -- 5. …”
Full text (MFA users only)
Electronic eBook