Search Results - (((((((ant OR kkantis) OR wantis) OR hints) OR cantor) OR anne) OR find) OR wkanting) algorithms.

  1. 361

    Building Machine Learning Systems with Python. by Richert, Willi

    Published 2013
    Table of Contents: “…A more complex dataset and a more complex classifierLearning about the Seeds dataset; Features and feature engineering; Nearest neighbor classification; Binary and multiclass classification; Summary; Chapter 3: Clustering -- Finding Related Posts; Measuring the relatedness of posts; How not to do it; How to do it; Preprocessing -- similarity measured as similar number of common words; Converting raw text into a bag-of-words; Counting words; Normalizing the word count vectors; Removing less important words; Stemming; Installing and using NLTK; Extending the vectorizer with NLTK's stemmer.…”
    Full text (MFA users only)
    Electronic eBook
  2. 362

    Clinical Guide to Cardiology. by Camm, Christian Fielder

    Published 2016
    Table of Contents: “…Intro -- Clinical Guide to Cardiology -- Contents -- Contributors -- Acronyms and Abbreviations -- About the Companion Website -- PART 1 Examination Techniques -- 1 Examination Techniques -- 1.1 Common conditions to be looked for on the examination -- 1.2 Clinical examination -- peripheries -- 1.3 Clinical examination -- the praecordium -- 1.4 How to present your findings -- Safety first approach -- Ward-round based -- 1.5 Eponymous signs and symptoms -- PART 2 Approach to Presenting Complaints -- 2 Chest Pain -- 2.1 Definition -- 2.2 Diagnostic algorithm -- 2.3 Differentials list…”
    Full text (MFA users only)
    Electronic eBook
  3. 363

    Moments, Positive Polynomials And Their Applications.

    Published 2009
    Table of Contents: “…Systems of Polynomial Equations -- 6.1 Introduction -- 6.2 Finding a Real Solution to Systems of Polynomial Equations -- 6.3 Finding All Complex and/or All Real Solutions: A Uni ed Treatment -- 6.4 Summary -- 6.5 Exercises -- 6.6 Notes and Sources -- 7. …”
    Full text (MFA users only)
    Electronic eBook
  4. 364
  5. 365
  6. 366

    Artificial vision : a clinical guide

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  7. 367

    The AI delusion by Smith, Gary

    Published 2018
    Table of Contents: “…If you torture the data long enough; Mendel; The Texas sharpshooter fallacy; Data mining; QuickStop; Torturing data; Retroactive recall; Money priming; Seek and you will find; The Laugher Curve; It's not you, it's me; Great to good.…”
    Full text (MFA users only)
    Electronic eBook
  8. 368

    Deep learning for dummies by Mueller, John, 1958-, Massaron, Luca

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  9. 369

    Robust and error-free geometric computing by Eberly, Dave

    Published 2020
    Full text (MFA users only)
    Electronic eBook
  10. 370

    Advanced Vaccine Research : Methods for the Decade of Vaccines.

    Published 2015
    Table of Contents: “…Epigenomics: understanding of inheritable chemical changesMetagenomics: finding new pathogens and strains; Bioinformatics challenges; 3: Comparative Genomics Approaches for Tracking the Emergence and Spread of Disease-associated Bacteria; Background; Comparative genomics of disease-associated bacteria; Assays for identification of disease-associated bacteria based on insights from comparative genomics; Conclusions; 4: Quantitative Proteomics in Vaccine Research; Introduction; Quantitative proteomics based on gel electrophoresis; Quantitative proteomics based on differential mass tag.…”
    Full text (MFA users only)
    Electronic eBook
  11. 371
  12. 372

    Machine learning with R quick start guide : a beginner's guide to implementing machine learning techniques from scratch using R 3.5 by Pastor Sanz, Iván

    Published 2019
    Table of Contents: “…Accessing components and elements in a listData frames; Accessing elements in data frames; Functions of data frames; Importing or exporting data; Working with functions; Controlling code flow; All about R packages; Installing packages; Necessary packages; Taking further steps; Background on the financial crisis; Summary; Chapter 2: Predicting Failures of Banks -- Data Collection; Collecting financial data; Why FDIC?; Listing files; Finding files; Combining results; Removing tables; Knowing your observations; Handling duplications; Operating our problem; Collecting the target variable…”
    Full text (MFA users only)
    Electronic eBook
  13. 373

    Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies by Parisi, Alessandro

    Published 2019
    Table of Contents: “…Detecting Email Cybersecurity Threats with AI; Detecting spam with Perceptrons; Meet NNs at their purest -- the Perceptron; It's all about finding the right weight!; Spam filters in a nutshell; Spam filters in action; Detecting spam with linear classifiers; How the Perceptron learns; A simple Perceptron-based spam filter; Pros and cons of Perceptrons; Spam detection with SVMs; SVM optimization strategy; SVM spam filter example; Image spam detection with SVMs…”
    Full text (MFA users only)
    Electronic eBook
  14. 374

    Data Mining and Statistics for Decision Making by Tufféry, Stéphane, Tufféry, Stéphane

    Published 2011
    Table of Contents: “…Overview of clustering methods -- Finding associations -- 10.1. Principles -- 10.2. …”
    Full text (MFA users only)
    eBook
  15. 375
  16. 376
  17. 377
  18. 378

    Frontiers in Computational Chemistry. by Qasmi, Zaheer-Ul-Haq

    Published 2020
    Full text (MFA users only)
    Electronic eBook
  19. 379

    Computational methods for next generation sequencing data analysis

    Published 2016
    Table of Contents: “…Măndoiu, Alex Zelikovsky and Yuri Khudyakov 3.1 Introduction 3.2 Design of Pools for Big Viral Data 3.2.1 Pool design optimization formulation 3.2.2 Greedy heuristic for VSPD problem 3.2.3 The tabu search heuristic for the OCBG problem 3.3 Deconvolution of viral samples from pools 3.3.1 Deconvolution using generalized intersections and differences of pools 3.3.2 Maximum likelihood k-clustering 3.4 Performance of pooling methods on simulated data 3.4.1 Performance of the viral sample pool design algorithm 3.4.2 Performance of the pool deconvolution algorithm 3.5 Experimental validation of pooling strategy 3.5.1 Experimental pools and sequencing 3.5.2 Results 3.6 Conclusion References 4 Applications of High-Fidelity Sequencing Protocol to RNA Viruses; Serghei Mangul, Nicholas C.…”
    Full text (MFA users only)
    Electronic eBook
  20. 380

    Frontiers of Artificial Intelligence in Medical Imaging. by Razmjooy, Navid

    Published 2023
    Table of Contents: “…5.5 Electromagnetic field optimization algorithm -- 5.6 Developed electromagnetic field optimization algorithm -- 5.7 Simulation results -- 5.7.1 Image acquisition -- 5.7.2 Pre-processing stage -- 5.7.3 Processing stage -- 5.7.4 Classification -- 5.8 Final evaluation -- 5.9 Conclusions -- References -- Chapter 6 Evaluation of COVID-19 lesion from CT scan slices: a study using entropy-based thresholding and DRLS segmentation -- 6.1 Introduction -- 6.2 Context -- 6.3 Methodology -- 6.3.1 COVID-19 database -- 6.3.2 Image conversion and pre-processing -- 6.3.3 Image thresholding…”
    Full text (MFA users only)
    Electronic eBook