Search Results - (((((((ant OR mantis) OR chanting) OR alter) OR cantor) OR anne) OR find) OR wanting) algorithms.

  1. 221

    Trading systems and methods by Kaufman, Perry J.

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  2. 222

    Bladder Cancer : diagnosis and clinical management

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  3. 223

    Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques. by Deshpande, Anand

    Published 2018
    Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
    Full text (MFA users only)
    Electronic eBook
  4. 224
  5. 225

    Cognitive foundations of musical pitch by Krumhansl, Carol L.

    Published 2001
    Table of Contents: “…Statistical analyses of tonal compositions Tonal distributions and tonal hierarchies; Tonal hierarchies, tonal consonance, and tonal distributions; 4. A KEY-FINDING ALGORITHM BASED ON TONAL HIERARCHIES; The key-finding algorithm; Application I: initial segments of preludes of J.S. …”
    Full text (MFA users only)
    Electronic eBook
  6. 226

    Industrial and Applied Mathematics in China. by Li, Tatsien

    Published 2014
    Table of Contents: “…Mathematical Problems in System-on-Chip Design and ManufactureA New Reconstruction Algorithm for Cone-beam CT with Unilateral Off-centered RT Multi-scan; Bioluminescence Tomography Reconstruction by Radial Basis Function Collocation Method.…”
    Full text (MFA users only)
    Electronic eBook
  7. 227
  8. 228
  9. 229

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
    Full text (MFA users only)
    Electronic eBook
  10. 230

    Computational ecology : graphs, networks and agent-based modeling by Zhang, Wenjun

    Published 2012
    Table of Contents: “…Paton's fundamental circuit finding algorithm; 1.2.2. Chan's circuit matrix algorithm; 1.3. …”
    Full text (MFA users only)
    Electronic eBook
  11. 231

    Apache Spark Machine Learning Blueprints. by Liu, Alex

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  12. 232

    Data analytics and big data by Sedkaoui, Soraya

    Published 2018
    Table of Contents: “…Data analytics and machine learning: the relevance of algorithms -- Machine learning: a method of data analysis that automates analytical model building -- Supervised versus unsupervised algorithms: a guided tour -- Applications and examples.…”
    Full text (MFA users only)
    Electronic eBook
  13. 233
  14. 234

    Graph Partitioning. by Bichot, Charles-Edmond

    Published 2013
    Table of Contents: “…Hendrickson-Leland coarsening algorithm; 2.3.4. The Heavy Edge Matching (HEM) algorithm; 2.4. …”
    Full text (MFA users only)
    Electronic eBook
  15. 235

    A practical guide to error-control coding using Matlab by Jiang, Yuan

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  16. 236

    Hardness of Approximation Between P and NP by Rubinstein, Aviad

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  17. 237

    Nonlinear systems and optimization for the chemical engineer : solving numerical problems by Buzzi-Ferraris, G. (Guido), Manenti, Flavio

    Published 2013
    Table of Contents: “…Nonlinear Systems and Optimization for the Chemical Engineer: Solving Numerical Problems; Contents; Preface; 1 Function Root-Finding; 1.1 Introduction; 1.2 Substitution Algorithms; 1.3 Bolzano's Algorithm; 1.4 Function Approximation; 1.4.1 Newton's Method; 1.4.2 The Secant Method; 1.4.3 Regula Falsi Method; 1.4.4 Muller's Method or Parabolic Interpolation; 1.4.5 Hyperbolic Interpolation Method; 1.4.6 Inverse Polynomial Interpolation Method; 1.4.7 Inverse Rational Interpolation Method; 1.5 Use of a Multiprocessor Machine with a Known Interval of Uncertainty.…”
    Full text (MFA users only)
    Electronic eBook
  18. 238
  19. 239

    Informatics for Materials Science and Engineering : Data-driven Discovery for Accelerated Experimentation and Application. by Rajan, Krishna

    Published 2013
    Table of Contents: “…Dimensionality Reduction Methods: Algorithms, Advantages, and Disadvantages; 3.1 Principal Component Analysis (PCA); PCA Algorithm; 3.2 Isomap; Isomap Algorithm; 3.3 Locally Linear Embedding; LLE Algorithm; 3.4 Hessian LLE; hLLE Algorithm; 4. …”
    Full text (MFA users only)
    Electronic eBook
  20. 240

    Mastering SciPy. by Blanco-Silva, Francisco J.

    Published 2015
    Full text (MFA users only)
    Electronic eBook