Search Results - (((((((ant OR kkantis) OR mantis) OR hints) OR cantor) OR anne) OR file) OR wanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 87
- Mathematical models 64
- Mathematics 58
- Algorithms 47
- Artificial intelligence 44
- Machine learning 44
- algorithms 41
- methods 34
- artificial intelligence 33
- Data mining 32
- Mathematical optimization 30
- Artificial Intelligence 24
- Computer networks 24
- Python (Computer program language) 23
- Signal processing 22
- Development 21
- Digital techniques 21
- Computer algorithms 20
- Data Mining 20
- Application software 19
- Image processing 17
- Computer science 16
- Diseases 16
- Computational Biology 15
- Computer simulation 15
- Neural networks (Computer science) 15
- Technological innovations 15
- Electronic data processing 14
- Statistical methods 14
- Computer security 13
Search alternatives:
- ant »
- kkantis »
- mantis »
- cantor »
- wanting »
-
861
Handbook of safety principles
Published 2018Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
Full text (MFA users only)
Electronic eBook -
862
Handbook of modeling high-frequency data in finance
Published 2012Full text (MFA users only)
Electronic eBook -
863
Advanced automation techniques in adaptive material processing
Published 2002Full text (MFA users only)
Electronic eBook -
864
Sense and Avoid in UAS : Research and Applications.
Published 2012Full text (MFA users only)
Electronic eBook -
865
Medical and Care Compunetics 2 : Medical and Care Compunetics 2.
Published 2005Full text (MFA users only)
Electronic eBook -
866
Smooth particle applied mechanics : the state of the art
Published 2006Full text (MFA users only)
Electronic eBook -
867
-
868
-
869
-
870
-
871
Asymptotic models of fields in dilute and densely packed composites
Published 2002Full text (MFA users only)
Electronic eBook -
872
Chaos : from simple models to complex systems
Published 2010Full text (MFA users only)
Electronic eBook -
873
From complexity in the natural sciences to complexity in operation management systems
Published 2019Full text (MFA users only)
Electronic eBook -
874
Hybrid systems, optimal control and hybrid vehicles : theory, methods and applications
Published 2017Full text (MFA users only)
Electronic eBook -
875
-
876
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
Full text (MFA users only)
Electronic eBook -
877
Advanced mathematical & computational tools in metrology & testing VIII
Published 2009Full text (MFA users only)
Electronic Conference Proceeding eBook -
878
-
879
Applied Univariate, Bivariate, and Multivariate Statistics Using Python : A Beginner's Guide to Advanced Data Analysis.
Published 2021Table of Contents: “…Discriminant Analysis -- 12.2 How Cluster Analysis Defines "Proximity" -- 12.2.1 Euclidean Distance -- 12.3 K-Means Clustering Algorithm -- 12.4 To Standardize or Not? -- 12.5 Cluster Analysis in Python -- 12.6 Hierarchical Clustering -- 12.7 Hierarchical Clustering in Python -- Review Exercises -- References -- Index -- EULA.…”
Full text (MFA users only)
Electronic eBook -
880
The illustrated network : how TCP/IP works in a modern network
Published 2017Table of Contents: “…Port Numbers -- Well-Known Ports -- The Socket -- UDP Operation -- UDP Overflows -- Questions for Readers -- 12 Transmission Control Protocol -- TCP and Connections -- The TCP Header -- TCP Mechanisms -- Connections and the Three-Way Handshake -- Connection Establishment -- Data Transfer -- Closing the Connection -- Flow Control -- TCP Windows -- Flow Control and Congestion Control -- Performance Algorithms -- TCP Behaving Badly? -- TCP and FTP -- Questions for Readers -- 13 Multiplexing and Sockets -- Layers and Applications -- The Socket Interface -- Socket Libraries -- TCP Stream Service Calls -- The Socket Interface: Good or Bad? …”
Full text (MFA users only)
Electronic eBook