Search Results - (((((((ant OR mkanthe) OR find) OR mantis) OR cantor) OR anne) OR halted) OR granting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 45
- Artificial intelligence 30
- Mathematics 27
- Machine learning 26
- Mathematical models 25
- Data mining 21
- Mathematical optimization 21
- algorithms 20
- artificial intelligence 20
- Algorithms 18
- methods 16
- Computer networks 15
- Research 15
- Computer algorithms 14
- Management 12
- Artificial Intelligence 11
- Diseases 11
- Information technology 11
- Signal processing 11
- Big data 10
- Bioinformatics 10
- Digital techniques 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- R (Computer program language) 10
- Social aspects 10
- Image processing 9
- Security measures 9
- Statistical methods 9
- Technological innovations 9
Search alternatives:
- ant »
- mkanthe »
- mantis »
- cantor »
- granting »
- find »
- halted »
-
361
Moments, Positive Polynomials And Their Applications.
Published 2009Table of Contents: “…Systems of Polynomial Equations -- 6.1 Introduction -- 6.2 Finding a Real Solution to Systems of Polynomial Equations -- 6.3 Finding All Complex and/or All Real Solutions: A Uni ed Treatment -- 6.4 Summary -- 6.5 Exercises -- 6.6 Notes and Sources -- 7. …”
Full text (MFA users only)
Electronic eBook -
362
CompTIA security+ deluxe study guide : exam SY0-301
Published 2011Full text (MFA users only)
Electronic eBook -
363
A comprehensive guide on OpenCL Programming with examples
Published 2013Full text (MFA users only)
Electronic eBook -
364
-
365
The AI delusion
Published 2018Table of Contents: “…If you torture the data long enough; Mendel; The Texas sharpshooter fallacy; Data mining; QuickStop; Torturing data; Retroactive recall; Money priming; Seek and you will find; The Laugher Curve; It's not you, it's me; Great to good.…”
Full text (MFA users only)
Electronic eBook -
366
-
367
Robust and error-free geometric computing
Published 2020Full text (MFA users only)
Electronic eBook -
368
Advanced Vaccine Research : Methods for the Decade of Vaccines.
Published 2015Table of Contents: “…Epigenomics: understanding of inheritable chemical changesMetagenomics: finding new pathogens and strains; Bioinformatics challenges; 3: Comparative Genomics Approaches for Tracking the Emergence and Spread of Disease-associated Bacteria; Background; Comparative genomics of disease-associated bacteria; Assays for identification of disease-associated bacteria based on insights from comparative genomics; Conclusions; 4: Quantitative Proteomics in Vaccine Research; Introduction; Quantitative proteomics based on gel electrophoresis; Quantitative proteomics based on differential mass tag.…”
Full text (MFA users only)
Electronic eBook -
369
Machine learning with R quick start guide : a beginner's guide to implementing machine learning techniques from scratch using R 3.5
Published 2019Table of Contents: “…Accessing components and elements in a listData frames; Accessing elements in data frames; Functions of data frames; Importing or exporting data; Working with functions; Controlling code flow; All about R packages; Installing packages; Necessary packages; Taking further steps; Background on the financial crisis; Summary; Chapter 2: Predicting Failures of Banks -- Data Collection; Collecting financial data; Why FDIC?; Listing files; Finding files; Combining results; Removing tables; Knowing your observations; Handling duplications; Operating our problem; Collecting the target variable…”
Full text (MFA users only)
Electronic eBook -
370
Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
Published 2019Table of Contents: “…Detecting Email Cybersecurity Threats with AI; Detecting spam with Perceptrons; Meet NNs at their purest -- the Perceptron; It's all about finding the right weight!; Spam filters in a nutshell; Spam filters in action; Detecting spam with linear classifiers; How the Perceptron learns; A simple Perceptron-based spam filter; Pros and cons of Perceptrons; Spam detection with SVMs; SVM optimization strategy; SVM spam filter example; Image spam detection with SVMs…”
Full text (MFA users only)
Electronic eBook -
371
Data Mining and Statistics for Decision Making
Published 2011Table of Contents: “…Overview of clustering methods -- Finding associations -- 10.1. Principles -- 10.2. …”
Full text (MFA users only)
eBook -
372
Semantic matchmaking with nonmonotonic description logics
Published 2009Full text (MFA users only)
Electronic eBook -
373
Asymptotic methods in the buckling theory of elastic shells
Published 2001Full text (MFA users only)
Electronic eBook -
374
Queenan's Management of High-Risk Pregnancy : an Evidence-Based Approach
Published 2012Full text (MFA users only)
Electronic eBook -
375
Deep Learning : From Big Data to Artificial Intelligence with R.
Published 2023Full text (MFA users only)
Electronic eBook -
376
-
377
Computational methods for next generation sequencing data analysis
Published 2016Table of Contents: “…Măndoiu, Alex Zelikovsky and Yuri Khudyakov 3.1 Introduction 3.2 Design of Pools for Big Viral Data 3.2.1 Pool design optimization formulation 3.2.2 Greedy heuristic for VSPD problem 3.2.3 The tabu search heuristic for the OCBG problem 3.3 Deconvolution of viral samples from pools 3.3.1 Deconvolution using generalized intersections and differences of pools 3.3.2 Maximum likelihood k-clustering 3.4 Performance of pooling methods on simulated data 3.4.1 Performance of the viral sample pool design algorithm 3.4.2 Performance of the pool deconvolution algorithm 3.5 Experimental validation of pooling strategy 3.5.1 Experimental pools and sequencing 3.5.2 Results 3.6 Conclusion References 4 Applications of High-Fidelity Sequencing Protocol to RNA Viruses; Serghei Mangul, Nicholas C.…”
Full text (MFA users only)
Electronic eBook -
378
Male sexual dysfunction : a clinical guide
Published 2017Full text (MFA users only)
Electronic eBook -
379
Frontiers of Artificial Intelligence in Medical Imaging.
Published 2023Table of Contents: “…5.5 Electromagnetic field optimization algorithm -- 5.6 Developed electromagnetic field optimization algorithm -- 5.7 Simulation results -- 5.7.1 Image acquisition -- 5.7.2 Pre-processing stage -- 5.7.3 Processing stage -- 5.7.4 Classification -- 5.8 Final evaluation -- 5.9 Conclusions -- References -- Chapter 6 Evaluation of COVID-19 lesion from CT scan slices: a study using entropy-based thresholding and DRLS segmentation -- 6.1 Introduction -- 6.2 Context -- 6.3 Methodology -- 6.3.1 COVID-19 database -- 6.3.2 Image conversion and pre-processing -- 6.3.3 Image thresholding…”
Full text (MFA users only)
Electronic eBook -
380
Signals & systems for dummies
Published 2013Table of Contents: “…Using Computer Tools for Modeling and SimulationSeeing the Big Picture; Chapter 2: Brushing Up on Math; Revealing Unknowns with Algebra; Making Nice Signal Models with Trig Functions; Manipulating Numbers: Essential Complex Arithmetic; Catching Up with Calculus; Finding Polynomial Roots; Chapter 3: Continuous-Time Signals and Systems; Considering Signal Types; Getting Hip to Signal Classifications; Transforming Simple Signals; Checking Out System Properties; Choosing Linear and Time-Invariant Systems; Chapter 4: Discrete-Time Signals and Systems; Exploring Signal Types.…”
Full text (MFA users only)
Electronic eBook