Search Results - (((((((ant OR kkantis) OR wants) OR hints) OR cantor) OR anne) OR find) OR wkanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 49
- Machine learning 35
- Artificial intelligence 30
- Mathematical models 29
- Mathematics 28
- Data mining 27
- algorithms 25
- Algorithms 24
- Mathematical optimization 23
- artificial intelligence 21
- methods 20
- Computer algorithms 17
- Computer networks 16
- Python (Computer program language) 16
- Research 14
- Artificial Intelligence 13
- Digital techniques 13
- Data Mining 12
- Management 12
- Neural networks (Computer science) 12
- R (Computer program language) 12
- Signal processing 12
- Big data 11
- Bioinformatics 11
- Development 11
- Image processing 11
- Information technology 11
- Technological innovations 11
- Application software 10
- Diseases 10
Search alternatives:
- ant »
- kkantis »
- wants »
- cantor »
- wkanting »
- find »
-
221
Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs.
Published 2018Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
Full text (MFA users only)
Electronic eBook -
222
Optimization advances in electric power systems
Published 2008Table of Contents: “…Unreliability Costs -- 3.5. Proposed Algorithms -- 3.5.1. ES and TS Algorithms -- 3.5.2. …”
Full text (MFA users only)
Electronic eBook -
223
Integrated and collaborative product development environment : technologies and implementations
Published 2006Table of Contents: “…Intelligent Optimisation of Process Planning; 5.1 Intelligent Optimisation Strategies for CAPP Systems; 5.2 Knowledge Representation of Process Plans; 5.2.1 Process plan representation; 5.2.2 Machining cost criteria for process plans; 5.2.3 Precedence constraints; 5.3 A Hybrid GA/SA-based Optimisation Method; 5.3.1 Overview of the algorithm; 5.3.2 Genetic algorithm -- phase 1; 5.3.3 Simulated annealing algorithm -- phase 2; 5.3.4 Constraint handling algorithm.…”
Full text (MFA users only)
Electronic eBook -
224
Datafied society : studying culture through data
Published 2017Full text (MFA users only)
Electronic eBook -
225
-
226
Bladder Cancer : diagnosis and clinical management
Published 2015Full text (MFA users only)
Electronic eBook -
227
Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques.
Published 2018Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
Full text (MFA users only)
Electronic eBook -
228
Cognitive foundations of musical pitch
Published 2001Table of Contents: “…Statistical analyses of tonal compositions Tonal distributions and tonal hierarchies; Tonal hierarchies, tonal consonance, and tonal distributions; 4. A KEY-FINDING ALGORITHM BASED ON TONAL HIERARCHIES; The key-finding algorithm; Application I: initial segments of preludes of J.S. …”
Full text (MFA users only)
Electronic eBook -
229
Industrial and Applied Mathematics in China.
Published 2014Table of Contents: “…Mathematical Problems in System-on-Chip Design and ManufactureA New Reconstruction Algorithm for Cone-beam CT with Unilateral Off-centered RT Multi-scan; Bioluminescence Tomography Reconstruction by Radial Basis Function Collocation Method.…”
Full text (MFA users only)
Electronic eBook -
230
Multi-Objective Optimization in Chemical Engineering : Developments and Applications.
Published 2013Full text (MFA users only)
Electronic eBook -
231
Adaptive phased array thermotherapy for cancer
Published 2009Full text (MFA users only)
Electronic eBook -
232
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
Full text (MFA users only)
Electronic eBook -
233
Computational ecology : graphs, networks and agent-based modeling
Published 2012Table of Contents: “…Paton's fundamental circuit finding algorithm; 1.2.2. Chan's circuit matrix algorithm; 1.3. …”
Full text (MFA users only)
Electronic eBook -
234
Apache Spark Machine Learning Blueprints.
Published 2016Full text (MFA users only)
Electronic eBook -
235
Data analytics and big data
Published 2018Table of Contents: “…Data analytics and machine learning: the relevance of algorithms -- Machine learning: a method of data analysis that automates analytical model building -- Supervised versus unsupervised algorithms: a guided tour -- Applications and examples.…”
Full text (MFA users only)
Electronic eBook -
236
-
237
Learning OpenCV 3 Application Development.
Published 2016Full text (MFA users only)
Electronic eBook -
238
Graph Partitioning.
Published 2013Table of Contents: “…Hendrickson-Leland coarsening algorithm; 2.3.4. The Heavy Edge Matching (HEM) algorithm; 2.4. …”
Full text (MFA users only)
Electronic eBook -
239
A practical guide to error-control coding using Matlab
Published 2010Full text (MFA users only)
Electronic eBook -
240
Hardness of Approximation Between P and NP
Published 2019Full text (MFA users only)
Electronic eBook