Search Results - (((((((ant OR hands) OR wantis) OR makant) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 40
- Artificial intelligence 36
- Machine learning 31
- Mathematical models 29
- Mathematics 25
- Algorithms 22
- artificial intelligence 22
- Mathematical optimization 19
- algorithms 19
- Data mining 18
- Technological innovations 15
- Computer networks 14
- Artificial Intelligence 13
- Computer algorithms 13
- Information technology 13
- Management 13
- Big data 12
- methods 12
- Digital techniques 11
- Signal processing 11
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Application software 9
- Computer security 9
- Design and construction 9
- Development 9
- Social aspects 9
- Computer programming 8
- Computer science 8
- Data Mining 8
Search alternatives:
- ant »
- wantis »
- makant »
- cantor »
- share »
-
21
An Introduction to Algorithmic Trading : Basic to Advanced Strategies.
Published 2011Full text (MFA users only)
Electronic eBook -
22
Structural geology algorithms : vectors and tensors
Published 2012Full text (MFA users only)
Electronic eBook -
23
Responsible Data Science : transparency and fairness in algorithms
Published 2021Full text (MFA users only)
Electronic eBook -
24
-
25
Pattern Recognition.
Published 2008Table of Contents: “…Chapter 13 Clustering Algorithms II: Hierarchical AlgorithmsChapter 14 Clustering Algorithms III: Schemes Based on Function Optimization; Chapter 15 Clustering Algorithms IV; Chapter 16 Cluster Validity; Appendix A Hints from Probability and Statistics; Appendix B Linear Algebra Basics; Appendix C Cost Function Optimization; Appendix D Basic Definitions from Linear Systems Theory; Index.…”
Full text (MFA users only)
Electronic eBook -
26
Signal processing for 5G : algorithms and implementations
Published 2016Table of Contents: “…An Introduction to Modulations and Waveforms for 5G Networks / Stefano Buzzi, Alessandro Ugolini, Alessio Zappone, Giulio Colavolpe -- Faster-than-Nyquist Signaling for 5G Communication / John B Anderson -- From OFDM to FBMC: Principles and Comparisons / Wei Jiang, Thomas Kaiser -- Filter Bank Multicarrier for Massive MIMO / Arman Farhang, Nicola Marchetti, Behrouz Farhang-Boroujeny -- Bandwidth-compressed Multicarrier Communication: SEFDM / Izzat Darwazeh, Tongyang Xu, Ryan C Grammenos -- Non-orthogonal Multi-User Superposition and Shared Access / Yifei Yuan -- Non-Orthogonal Multiple Access (NOMA): Concept and Design / Anass Benjebbour, Keisuke Saito, Anxin Li, Yoshihisa Kishiyama, Takehiro Nakamura -- Major 5G Waveform Candidates: Overview and Comparison / Hao Lin, Pierre Siohan -- NEW SPATIAL SIGNAL PROCESSING FOR 5G. …”
Full text (MFA users only)
Electronic eBook -
27
-
28
Metaheuristic optimization for the design of automatic control laws
Published 2013Table of Contents: “…Ant colony optimization…”
Full text (MFA users only)
Electronic eBook -
29
Pedestrian Detection Algorithms using Shearlets.
Published 2019Table of Contents: “…4.3 Conclusion5 Pedestrian Detection using Shearlet Features; 5.1 Pedestrian Detection using Hand-crafted Features; 5.2 Shearlet Image Features; 5.3 Shearlet Filterbank; 5.4 Implementation Details; 5.5 Experiments; 5.5.1 Detection Framework Settings; 5.5.2 Image Feature Experiments; 5.5.3 Filterbank Experiments; 5.6 Conclusion; 6 Deep Learning with Shearlets; 6.1 Introduction on Neural Networks; 6.1.1 Artificial Neural Networks; 6.1.2 Convolutional Neural Networks; 6.1.3 Pedestrian Detection Algorithms using CNNs; 6.2 Integration of Shearlets in CNNs; 6.2.1 Related Work…”
Full text (MFA users only)
Electronic eBook -
30
Introduction to programming : learn to program in Java with data structures, algorithms, and logic
Published 2018Full text (MFA users only)
Electronic eBook -
31
Hands-On Blockchain with Hyperledger : Building Decentralized Applications with Hyperledger Fabric and Composer.
Published 2018Table of Contents: “…Decentralization with systemic governanceEnterprise support; Use case-driven pluggability choices; Shared ledger technology; Consensus; Crypto algorithms and encryption technology; Use case-driven pluggable choices; Enterprise integration and designing for extensibility; Other considerations; Consensus, ACID property, and CAP; CAP; ACID; Attestation -- SSCs are signed and encrypted; Use of HSMs; Summary; Chapter 2: Exploring Hyperledger Fabric; Building on the foundations of open computing; Fundamentals of the Hyperledger project; The Linux Foundation ; Hyperledger.…”
Full text (MFA users only)
Electronic eBook -
32
Practical Algorithms for 3D Computer Graphics, Second Edition.
Published 2013Full text (MFA users only)
Electronic eBook -
33
Hands-On Cryptography with Python : Leverage the Power of Python to Encrypt and Decrypt Data.
Published 2018Full text (MFA users only)
Electronic eBook -
34
-
35
Simple adaptive strategies : from regret-matching to uncoupled dynamics
Published 2013Full text (MFA users only)
Electronic eBook -
36
Network and discrete location : models, algorithms, and applications
Published 2013Full text (MFA users only)
Electronic eBook -
37
-
38
A Hands-On Guide to Designing Embedded Systems.
Published 2021Table of Contents: “…-- 3.7 Finite State Machine Design -- 3.7.1 Defining a State Machine -- 3.7.2 Algorithmic State Diagrams -- 3.7.3 Moore or Mealy: What Should I Choose? …”
Full text (MFA users only)
Electronic eBook -
39
Sharing economy and big data analytics
Published 2020Table of Contents: “…The Sharing Economy or the Emergence of a New Business Model. …”
Full text (MFA users only)
Electronic eBook -
40
Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow.
Published 2018Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
Full text (MFA users only)
Electronic eBook