Search Results - (((((((ant OR kkantis) OR wantis) OR hints) OR cantor) OR anne) OR find) OR wkanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 45
- Artificial intelligence 28
- Machine learning 27
- Mathematics 27
- Mathematical models 26
- algorithms 23
- Algorithms 22
- Mathematical optimization 22
- Data mining 20
- artificial intelligence 19
- Computer algorithms 16
- Computer networks 16
- methods 16
- Research 14
- Digital techniques 12
- Management 12
- Signal processing 12
- Artificial Intelligence 11
- Information technology 11
- Big data 10
- Bioinformatics 10
- Diseases 10
- Image processing 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- R (Computer program language) 10
- Technological innovations 10
- Social aspects 9
- Statistical methods 9
- Data Mining 8
Search alternatives:
- ant »
- kkantis »
- wantis »
- cantor »
- wkanting »
- find »
-
361
Building Machine Learning Systems with Python.
Published 2013Table of Contents: “…A more complex dataset and a more complex classifierLearning about the Seeds dataset; Features and feature engineering; Nearest neighbor classification; Binary and multiclass classification; Summary; Chapter 3: Clustering -- Finding Related Posts; Measuring the relatedness of posts; How not to do it; How to do it; Preprocessing -- similarity measured as similar number of common words; Converting raw text into a bag-of-words; Counting words; Normalizing the word count vectors; Removing less important words; Stemming; Installing and using NLTK; Extending the vectorizer with NLTK's stemmer.…”
Full text (MFA users only)
Electronic eBook -
362
Clinical Guide to Cardiology.
Published 2016Table of Contents: “…Intro -- Clinical Guide to Cardiology -- Contents -- Contributors -- Acronyms and Abbreviations -- About the Companion Website -- PART 1 Examination Techniques -- 1 Examination Techniques -- 1.1 Common conditions to be looked for on the examination -- 1.2 Clinical examination -- peripheries -- 1.3 Clinical examination -- the praecordium -- 1.4 How to present your findings -- Safety first approach -- Ward-round based -- 1.5 Eponymous signs and symptoms -- PART 2 Approach to Presenting Complaints -- 2 Chest Pain -- 2.1 Definition -- 2.2 Diagnostic algorithm -- 2.3 Differentials list…”
Full text (MFA users only)
Electronic eBook -
363
Moments, Positive Polynomials And Their Applications.
Published 2009Table of Contents: “…Systems of Polynomial Equations -- 6.1 Introduction -- 6.2 Finding a Real Solution to Systems of Polynomial Equations -- 6.3 Finding All Complex and/or All Real Solutions: A Uni ed Treatment -- 6.4 Summary -- 6.5 Exercises -- 6.6 Notes and Sources -- 7. …”
Full text (MFA users only)
Electronic eBook -
364
CompTIA security+ deluxe study guide : exam SY0-301
Published 2011Full text (MFA users only)
Electronic eBook -
365
A comprehensive guide on OpenCL Programming with examples
Published 2013Full text (MFA users only)
Electronic eBook -
366
-
367
The AI delusion
Published 2018Table of Contents: “…If you torture the data long enough; Mendel; The Texas sharpshooter fallacy; Data mining; QuickStop; Torturing data; Retroactive recall; Money priming; Seek and you will find; The Laugher Curve; It's not you, it's me; Great to good.…”
Full text (MFA users only)
Electronic eBook -
368
-
369
Robust and error-free geometric computing
Published 2020Full text (MFA users only)
Electronic eBook -
370
Advanced Vaccine Research : Methods for the Decade of Vaccines.
Published 2015Table of Contents: “…Epigenomics: understanding of inheritable chemical changesMetagenomics: finding new pathogens and strains; Bioinformatics challenges; 3: Comparative Genomics Approaches for Tracking the Emergence and Spread of Disease-associated Bacteria; Background; Comparative genomics of disease-associated bacteria; Assays for identification of disease-associated bacteria based on insights from comparative genomics; Conclusions; 4: Quantitative Proteomics in Vaccine Research; Introduction; Quantitative proteomics based on gel electrophoresis; Quantitative proteomics based on differential mass tag.…”
Full text (MFA users only)
Electronic eBook -
371
World's greatest architect : making, meaning, and network culture
Published 2008Full text (MFA users only)
Electronic eBook -
372
Machine learning with R quick start guide : a beginner's guide to implementing machine learning techniques from scratch using R 3.5
Published 2019Table of Contents: “…Accessing components and elements in a listData frames; Accessing elements in data frames; Functions of data frames; Importing or exporting data; Working with functions; Controlling code flow; All about R packages; Installing packages; Necessary packages; Taking further steps; Background on the financial crisis; Summary; Chapter 2: Predicting Failures of Banks -- Data Collection; Collecting financial data; Why FDIC?; Listing files; Finding files; Combining results; Removing tables; Knowing your observations; Handling duplications; Operating our problem; Collecting the target variable…”
Full text (MFA users only)
Electronic eBook -
373
Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
Published 2019Table of Contents: “…Detecting Email Cybersecurity Threats with AI; Detecting spam with Perceptrons; Meet NNs at their purest -- the Perceptron; It's all about finding the right weight!; Spam filters in a nutshell; Spam filters in action; Detecting spam with linear classifiers; How the Perceptron learns; A simple Perceptron-based spam filter; Pros and cons of Perceptrons; Spam detection with SVMs; SVM optimization strategy; SVM spam filter example; Image spam detection with SVMs…”
Full text (MFA users only)
Electronic eBook -
374
Data Mining and Statistics for Decision Making
Published 2011Table of Contents: “…Overview of clustering methods -- Finding associations -- 10.1. Principles -- 10.2. …”
Full text (MFA users only)
eBook -
375
Semantic matchmaking with nonmonotonic description logics
Published 2009Full text (MFA users only)
Electronic eBook -
376
Asymptotic methods in the buckling theory of elastic shells
Published 2001Full text (MFA users only)
Electronic eBook -
377
Deep Learning : From Big Data to Artificial Intelligence with R.
Published 2023Full text (MFA users only)
Electronic eBook -
378
-
379
Computational methods for next generation sequencing data analysis
Published 2016Table of Contents: “…Măndoiu, Alex Zelikovsky and Yuri Khudyakov 3.1 Introduction 3.2 Design of Pools for Big Viral Data 3.2.1 Pool design optimization formulation 3.2.2 Greedy heuristic for VSPD problem 3.2.3 The tabu search heuristic for the OCBG problem 3.3 Deconvolution of viral samples from pools 3.3.1 Deconvolution using generalized intersections and differences of pools 3.3.2 Maximum likelihood k-clustering 3.4 Performance of pooling methods on simulated data 3.4.1 Performance of the viral sample pool design algorithm 3.4.2 Performance of the pool deconvolution algorithm 3.5 Experimental validation of pooling strategy 3.5.1 Experimental pools and sequencing 3.5.2 Results 3.6 Conclusion References 4 Applications of High-Fidelity Sequencing Protocol to RNA Viruses; Serghei Mangul, Nicholas C.…”
Full text (MFA users only)
Electronic eBook -
380
Frontiers of Artificial Intelligence in Medical Imaging.
Published 2023Table of Contents: “…5.5 Electromagnetic field optimization algorithm -- 5.6 Developed electromagnetic field optimization algorithm -- 5.7 Simulation results -- 5.7.1 Image acquisition -- 5.7.2 Pre-processing stage -- 5.7.3 Processing stage -- 5.7.4 Classification -- 5.8 Final evaluation -- 5.9 Conclusions -- References -- Chapter 6 Evaluation of COVID-19 lesion from CT scan slices: a study using entropy-based thresholding and DRLS segmentation -- 6.1 Introduction -- 6.2 Context -- 6.3 Methodology -- 6.3.1 COVID-19 database -- 6.3.2 Image conversion and pre-processing -- 6.3.3 Image thresholding…”
Full text (MFA users only)
Electronic eBook