Search Results - (((((((ant OR wante) OR semantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 62
- Artificial intelligence 59
- Mathematics 44
- Mathematical models 40
- Machine learning 37
- artificial intelligence 32
- Data mining 30
- Algorithms 27
- Mathematical optimization 27
- Artificial Intelligence 23
- algorithms 23
- Technological innovations 22
- Social aspects 20
- Computer networks 19
- Python (Computer program language) 18
- methods 17
- Data Mining 16
- History 16
- Big data 15
- Computer science 15
- Information technology 15
- Application software 14
- Computer algorithms 14
- Development 14
- Digital techniques 13
- Image processing 13
- Statistical methods 13
- Neural networks (Computer science) 12
- Research 12
- Design and construction 11
Search alternatives:
- ant »
- wante »
- semantic »
- cantor »
-
761
-
762
Designing and Researching of Machines and Technologies for Modern Manufacture.
Published 2015Full text (MFA users only)
Electronic Conference Proceeding eBook -
763
-
764
Atlas of minimally invasive surgery for lung and esophageal cancer
Published 2017Full text (MFA users only)
Electronic eBook -
765
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
Full text (MFA users only)
Electronic eBook -
766
Nonlinear science and complexity
Published 2007Table of Contents: “…Bruzón -- Applying a new algorithm to derive nonclassical symmetries / M.S. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
767
-
768
-
769
-
770
Stirling Cycle Engines : Inner Workings and Design.
Published 2013Table of Contents: “…-- 3.6 The way forward -- 4 Equivalence conditions for volume variations -- 4.1 Kinematic configuration -- 4.2 'Additional' dead space -- 4.3 Net swept volume -- 5 The optimum versus optimization -- 5.1 An engine from Turkey rocks the boat -- 5.2 ... and an engine from Duxford -- 5.3 Schmidt on Schmidt -- 5.3.1 Volumetric compression ratio rv -- 5.3.2 Indicator diagram shape -- 5.3.3 More from the re-worked Schmidt analysis -- 5.4 Crank-slider mechanism again -- 5.5 Implications for engine design in general -- 6 Steady-flow heat transfer correlations -- 6.1 Turbulent -- or turbulent? …”
Full text (MFA users only)
Electronic eBook -
771
-
772
-
773
Techniques and key points for endoscopic cranial base reconstruction
Published 2021Table of Contents: “…Techniques and Key Points for Endoscopic Cranial Base Reconstruction -- MedOne Access Information -- Tittle Page -- Copyright -- Dedication -- Contents -- Videos -- Foreword -- Preface -- Acknowledgments -- Contributors -- Section I Introduction -- 1 Principles of Endoscopic Cranial Base Reconstruction -- 1.1 Introduction -- 1.2 Fundamentals of Endonasal Reconstruction -- 1.3 Repair Options -- 1.4 Vascularized Reconstruction -- 1.5 Reconstruction Decalogue -- 2 Operative Planning and Treatment Algorithm -- 2.1 Introduction -- 2.2 Preoperative Planning -- 2.3 Perioperative and Intraoperative Considerations -- 2.4 Treatment Algorithm -- 2.5 Postoperative Considerations -- 2.5.1 Inpatient Care -- 2.5.2 Outpatient Care -- Section II Nasoseptal Flap and Variations -- 3 Standard Nasoseptal Flap -- 3.1 Anatomy -- 3.2 Fundamentals -- 3.3 Indications -- 3.4 Limitations -- 3.5 Surgical Technique -- 3.5.1 Harvest -- 3.5.2 Reconstruction -- 3.6 Postoperative Care -- 3.7 Managing Complications -- 4 Rescue Nasoseptal Flap -- 4.1 Fundamentals -- 4.2 Indications -- 4.3 Limitations -- 4.4 Surgical Technique -- 4.5 Postoperative Care -- 4.6 Complications -- 5 Extended Nasoseptal Flap -- 5.1 Fundamentals -- 5.2 Indications -- 5.3 Limitations -- 5.4 Surgical Technique -- 5.4.1 Harvest -- 5.4.2 Reconstruction -- 5.5 Postoperative Care -- 5.5.1 One-Week Postoperative Visit -- 5.5.2 One-Month Postoperative Visit -- 5.5.3 Four-Month Postoperative Visit -- 5.6 Complications -- 6 Nasoseptal Flap Pedicle Release -- 6.1 Anatomy -- 6.2 Fundamentals -- 6.3 Indications -- 6.4 Limitations -- 6.5 Surgical Technique -- 6.5.1 360-Degree Bone Removal around the SPA Foramen (Osseous Release) -- 6.5.2 Ipsilateral Transpterygoid Approach -- 6.5.3 360-Degree Circumferential Incision in the Periosteum of the PPF around the SPA (Periosteal Release) -- 6.6 Postoperative Care.…”
Full text (MFA users only)
Electronic eBook -
774
Mechanical and Electronics Engineering : proceedings of the International Conference on ICMEE 2009, Chennai, India, 24-26 July 2009
Published 2010Table of Contents: “…Shafie -- The investigation of input shaping with different polarities for anti-sway control of a gantry crane system / Mohd. …”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
775
RSSDI Diabetes update 2018
Published 2019Table of Contents: “…-- Chapter 42: Etiopathogenesis and Management of Diabetic Heart Failure -- Chapter 43: Diabetes and Stroke -- Chapter 44: Cellular Mechanism of Atherosclerosis in Diabetes Mellitus -- Chapter 45: Nondiabetic Ocular Complications in Diabetes -- Chapter 46: Nondiabetic Kidney Disease in Patients with Type 2 Diabetes Mellitus: When to Suspect?.…”
Full text (MFA users only)
eBook -
776
-
777
Nuclear Medicine Imaging: An Encyclopedic Dictionary
Published 2012Full text (MFA users only)
Electronic eBook -
778
Understanding smart sensors
Published 2013Table of Contents: “…ZigBee-Like Wireless -- 8.3.3. ANT+ -- 8.3.4.6LoWPAN -- 8.3.5. Near Field Communication (NFC) -- 8.3.6.Z-Wave -- 8.3.7. …”
Full text (MFA users only)
Electronic eBook -
779
Fundamentals of Fluid Power Control.
Published 2009Table of Contents: “…Control-Volume Flow Continuity -- PRV Flow -- Force Balance at the Spindle -- 5.13.3 Frequency Response from a Linearized Transfer Function Analysis -- 5.14 Servovalve Dynamics -- First-Stage, Armature, and Flapper-Nozzle -- Flapper-Nozzle and Resistance Bridge Flow Characteristic -- Force Balance at the Spool -- 5.15 An Open-Loop Servovalve-Motor Drive with Line Dynamics Modeled by Lumped Approximations -- Servovalve, Dynamics Included, Underlapped Spool -- Lines, Laminar Mean Flow, Two Lump Approximations per Line, Negligible Motor Internal Volume -- Motor Flow and Torque Equations -- 5.16 Transmission Line Dynamics -- 5.16.1 Introduction -- Servovalve-Cylinder with Short Lines and Significant Actuator Volumes -- Servovalve-Motor with Long Lines and Negligible Actuator Volumes -- 5.16.2 Lossless Line Model for Z and Y -- 5.16.3 Average and Distributed Line Friction Models for Z and Y -- 5.16.4 Frequency-Domain Analysis -- 5.16.5 Servovalve-Reflected Linearized Coefficients -- 5.16.6 Modeling Systems with Nonlossless Transmission Lines, the Modal Analysis Method -- 5.16.7 Modal Analysis Applied to a Servovalve-Motor Open-Loop Drive -- 5.17 The State-Space Method for Linear Systems Modeling -- 5.17.1 Modeling Principles -- 5.17.2 Some Further Aspects of the Time-Domain Solution -- 5.17.3 The Transfer Function Concept in State Space -- 5.18 Data-Based Dynamic Modeling -- 5.18.1 Introduction -- 5.18.2 Time-Series Modeling -- 5.18.3 The Group Method of Data Handling (GMDH) Algorithm -- 5.18.4 Artificial Neural Networks -- 5.18.5 A Comparison of Time-Series, GMDH, and ANN Modeling of a Second-Order Dynamic System -- 5.18.6 Time-Series Modeling of a Position Control System -- 5.18.7 Time-Series Modeling for Fault Diagnosis -- 5.18.8 Time-Series Modeling of a Proportional PRV -- 5.18.9 GMDH Modeling of a Nitrogen-Filled Accumulator.…”
Full text (MFA users only)
Electronic eBook -
780
Flood hazard identification and mitigation in semi- and arid environments
Published 2012Full text (MFA users only)
Electronic eBook