Search Results - (((((((ant OR kkantis) OR mantis) OR hints) OR cantor) OR anne) OR file) OR wanting) algorithms.

  1. 861

    Handbook of safety principles

    Published 2018
    Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
    Full text (MFA users only)
    Electronic eBook
  2. 862

    Handbook of modeling high-frequency data in finance

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  3. 863

    Advanced automation techniques in adaptive material processing

    Published 2002
    Full text (MFA users only)
    Electronic eBook
  4. 864

    Sense and Avoid in UAS : Research and Applications. by Angelov, Plamen

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  5. 865

    Medical and Care Compunetics 2 : Medical and Care Compunetics 2. by Bos, L.

    Published 2005
    Full text (MFA users only)
    Electronic eBook
  6. 866
  7. 867

    Practical statistics for astronomers by Wall, J. V.

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  8. 868

    Atlas of head and neck robotic surgery

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  9. 869

    Hands-On Deep Learning with TensorFlow. by Boxel, Dan Van

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  10. 870

    Computational methods for physics by Franklin, Joel, 1975-

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  11. 871
  12. 872

    Chaos : from simple models to complex systems by Cencini, Massimo

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  13. 873
  14. 874
  15. 875
  16. 876

    Artificial intelligence and data mining approaches in security frameworks

    Published 2021
    Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
    Full text (MFA users only)
    Electronic eBook
  17. 877

    Advanced mathematical & computational tools in metrology & testing VIII

    Published 2009
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  18. 878

    Big Data Analytics with R. by Walkowiak, Simon

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  19. 879

    Applied Univariate, Bivariate, and Multivariate Statistics Using Python : A Beginner's Guide to Advanced Data Analysis. by Denis, Daniel J.

    Published 2021
    Table of Contents: “…Discriminant Analysis -- 12.2 How Cluster Analysis Defines "Proximity" -- 12.2.1 Euclidean Distance -- 12.3 K-Means Clustering Algorithm -- 12.4 To Standardize or Not? -- 12.5 Cluster Analysis in Python -- 12.6 Hierarchical Clustering -- 12.7 Hierarchical Clustering in Python -- Review Exercises -- References -- Index -- EULA.…”
    Full text (MFA users only)
    Electronic eBook
  20. 880

    The illustrated network : how TCP/IP works in a modern network by Goralski, Walter

    Published 2017
    Table of Contents: “…Port Numbers -- Well-Known Ports -- The Socket -- UDP Operation -- UDP Overflows -- Questions for Readers -- 12 Transmission Control Protocol -- TCP and Connections -- The TCP Header -- TCP Mechanisms -- Connections and the Three-Way Handshake -- Connection Establishment -- Data Transfer -- Closing the Connection -- Flow Control -- TCP Windows -- Flow Control and Congestion Control -- Performance Algorithms -- TCP Behaving Badly? -- TCP and FTP -- Questions for Readers -- 13 Multiplexing and Sockets -- Layers and Applications -- The Socket Interface -- Socket Libraries -- TCP Stream Service Calls -- The Socket Interface: Good or Bad? …”
    Full text (MFA users only)
    Electronic eBook