Search Results - (((((((ant OR stantis) OR wants) OR hands) OR cantor) OR anne) OR file) OR wsanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 99
- Mathematical models 73
- Mathematics 64
- Machine learning 54
- Artificial intelligence 51
- Algorithms 48
- algorithms 41
- artificial intelligence 38
- methods 38
- Data mining 35
- Mathematical optimization 30
- Python (Computer program language) 29
- Artificial Intelligence 26
- Computer networks 26
- Development 24
- Signal processing 24
- Digital techniques 22
- Application software 21
- Computer algorithms 21
- Data Mining 20
- Image processing 19
- Computer science 18
- Technological innovations 18
- Computer security 17
- Computer simulation 17
- Diseases 17
- Neural networks (Computer science) 16
- Computational Biology 15
- Research 15
- Statistical methods 15
Search alternatives:
- ant »
- stantis »
- wants »
- cantor »
- wsanting »
-
61
-
62
Simple adaptive strategies : from regret-matching to uncoupled dynamics
Published 2013Full text (MFA users only)
Electronic eBook -
63
Nearest-neighbor methods in learning and vision : theory and practice
Published 2005Full text (MFA users only)
Electronic eBook -
64
Error Correction Coding : Mathematical Methods and Algorithms.
Published 2020Table of Contents: “…Cover -- Title Page -- Copyright -- Contents -- Preface -- List of Program Files -- List of Laboratory Exercises -- List of Algorithms -- List of Figures -- List of Tables -- List of Boxes -- About the Companion Website -- Part I Introduction and Foundations -- Chapter 1 A Context for Error Correction Coding -- 1.1 Purpose of This Book -- 1.2 Introduction: Where Are Codes? …”
Full text (MFA users only)
Electronic eBook -
65
Computer animation : algorithms and techniques
Published 2012Full text (MFA users only)
Electronic eBook -
66
Network and discrete location : models, algorithms, and applications
Published 2013Full text (MFA users only)
Electronic eBook -
67
-
68
-
69
Algorithms, architectures and information systems security
Published 2009Full text (MFA users only)
Electronic Conference Proceeding eBook -
70
-
71
-
72
Molecular bioinformatics : algorithms and applications
Published 1996Full text (MFA users only)
Electronic eBook -
73
Hands-On Artificial Intelligence for IoT : Expert Machine Learning and Deep Learning Techniques for Developing Smarter IoT Systems.
Published 2019Table of Contents: “…Using TXT files in PythonCSV format; Working with CSV files with the csv module; Working with CSV files with the pandas module; Working with CSV files with the NumPy module; XLSX format; Using OpenPyXl for XLSX files; Using pandas with XLSX files; Working with the JSON format; Using JSON files with the JSON module; JSON files with the pandas module; HDF5 format; Using HDF5 with PyTables; Using HDF5 with pandas; Using HDF5 with h5py; SQL data; The SQLite database engine; The MySQL database engine; NoSQL data; HDFS; Using hdfs3 with HDFS; Using PyArrow's filesystem interface for HDFS; Summary…”
Full text (MFA users only)
Electronic eBook -
74
A Hands-On Guide to Designing Embedded Systems.
Published 2021Table of Contents: “…-- 3.6.2 Self-Checking Test Benches -- 3.6.3 Corner Cases, Boundary Conditions, and Stress Testing -- 3.6.4 Code Coverage -- 3.6.5 Test Functions and Procedures -- 3.6.6 Behavioral Models -- 3.6.7 Using Text IO Files -- 3.6.8 What Else Might We Consider? -- 3.7 Finite State Machine Design -- 3.7.1 Defining a State Machine -- 3.7.2 Algorithmic State Diagrams -- 3.7.3 Moore or Mealy: What Should I Choose? …”
Full text (MFA users only)
Electronic eBook -
75
Hands-On Reinforcement Learning with Python : Master Reinforcement and Deep Reinforcement Learning Using OpenAI Gym and TensorFlow.
Published 2018Table of Contents: “…Solving the taxi problem using Q learningSARSA; Solving the taxi problem using SARSA; The difference between Q learning and SARSA; Summary; Questions; Further reading; Chapter 6: Multi-Armed Bandit Problem; The MAB problem; The epsilon-greedy policy; The softmax exploration algorithm; The upper confidence bound algorithm; The Thompson sampling algorithm; Applications of MAB; Identifying the right advertisement banner using MAB; Contextual bandits; Summary; Questions; Further reading; Chapter 7: Deep Learning Fundamentals; Artificial neurons; ANNs; Input layer; Hidden layer; Output layer.…”
Full text (MFA users only)
Electronic eBook -
76
-
77
-
78
-
79
Delphi High Performance : Build fast Delphi applications using concurrency, parallel programming and memory management.
Published 2018Table of Contents: “…Object file formatsObject file linking in practice; Using C++ libraries; Using a proxy DLL in Delphi; Summary; Chapter 9: Best Practices; About performance; Fixing the algorithm; Fine-tuning the code; Memory management; Getting started with the parallel world; Working with parallel tools; Exploring parallel practices; Using external libraries; Final words; Other Books You May Enjoy; Index.…”
Full text (MFA users only)
Electronic eBook -
80
Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
Published 2019Table of Contents: “…; Useful keyboard shortcuts; Choose your notebook kernel; Getting your hands dirty; Installing DL libraries; Deep learning pros and cons for cybersecurity; TensorFlow; Keras…”
Full text (MFA users only)
Electronic eBook