Search Results - (((((((ant OR wanti) OR mantis) OR when) OR cantor) OR anne) OR shane) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 35
- Data processing 26
- artificial intelligence 24
- Machine learning 21
- Mathematical optimization 21
- Mathematics 21
- Mathematical models 20
- Algorithms 19
- algorithms 18
- Artificial Intelligence 16
- Data mining 15
- Social aspects 13
- Computer algorithms 12
- Technological innovations 12
- Computer networks 11
- Neural networks (Computer science) 10
- methods 10
- Design and construction 9
- Development 9
- Diseases 9
- Information technology 9
- Python (Computer program language) 9
- Research 9
- Data Mining 8
- History 8
- Statistical methods 8
- Application software 7
- Electronic data processing 7
- Management 7
- Philosophy 7
Search alternatives:
- ant »
- wanti »
- mantis »
- cantor »
- shane »
-
21
Pattern Recognition.
Published 2008Table of Contents: “…Chapter 13 Clustering Algorithms II: Hierarchical AlgorithmsChapter 14 Clustering Algorithms III: Schemes Based on Function Optimization; Chapter 15 Clustering Algorithms IV; Chapter 16 Cluster Validity; Appendix A Hints from Probability and Statistics; Appendix B Linear Algebra Basics; Appendix C Cost Function Optimization; Appendix D Basic Definitions from Linear Systems Theory; Index.…”
Full text (MFA users only)
Electronic eBook -
22
Optimization in Engineering Sciences : Exact Methods.
Published 2013Table of Contents: “…Lagrange method; 1.4. Simplex algorithm; 1.4.1. Principle; 1.4.2. Simplicial form formulation; 1.4.3. …”
Full text (MFA users only)
Electronic eBook -
23
-
24
Algorithmics of matching under preferences
Published 2013Full text (MFA users only)
Electronic eBook -
25
Metaheuristic optimization for the design of automatic control laws
Published 2013Table of Contents: “…Ant colony optimization…”
Full text (MFA users only)
Electronic eBook -
26
Optimization of Computer Networks : Modeling and Algorithms: a Hands-On Approach.
Published 2016Table of Contents: “…7.1 Introduction -- 7.2 Node Location Problems -- 7.3 Full Topology Design Problems -- 7.4 Multilayer Network Design -- 7.5 Notes and Sources -- 7.6 Exercises -- References -- Part Two: Algorithms -- Chapter 8: Gradient Algorithms in Network Design -- 8.1 Introduction -- 8.2 Convergence Rates -- 8.3 Projected Gradient Methods -- 8.4 Asynchronous and Distributed Algorithm Implementations -- 8.5 Non-Smooth Functions -- 8.6 Stochastic Gradient Methods -- 8.7 Stopping Criteria -- 8.8 Algorithm Design Hints -- 8.9 Notes and Sources -- 8.10 Exercises -- References…”
Full text (MFA users only)
Electronic eBook -
27
Data Structure and Algorithms Using C++ : A Practical Implementation.
Published 2021Table of Contents: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- 1 Introduction to Data Structure -- 1.1 Definition and Use of Data Structure -- 1.2 Types of Data Structure -- Linear Data Structures -- Non-Linear Data Structure -- Operations Performed in Data Structure -- 1.3 Algorithm -- Steps Required to Develop an Algorithm -- Mathematical Notations and Functions -- Algorithemic Notations -- 1.4 Complexity of an Algorithm -- Space Complexity -- Time Complexity -- Best Case -- Worst Case -- Average Case -- 1.5 Efficiency of an Algorithm…”
Full text (MFA users only)
Electronic eBook -
28
Algorithmic Graph Theory and Perfect Graphs.
Published 2014Table of Contents: “…The Design of Efficient Algorithms; 1. The Complexity of Computer Algorithms; 2. …”
Full text (MFA users only)
Electronic eBook -
29
-
30
Network and discrete location : models, algorithms, and applications
Published 2013Full text (MFA users only)
Electronic eBook -
31
CUDA programming : a developer's guide to parallel computing with GPUs
Published 2013Full text (MFA users only)
Electronic eBook -
32
Meta-heuristic and evolutionary algorithms for engineering optimization
Published 2017Table of Contents: “…Overview of optimization -- Introduction to meta-heuristic and evolutionary algorithms -- Pattern search (PS) -- Genetic algorithm (GA) -- Simulated annealing (SA) -- Tabu search (TS) -- Ant colony optimization (ACO) -- Particle swarm optimization (PSO) -- Differential evolution (DE) -- Harmony search (HS) -- Shuffled frog-leaping algorithm (SFLA) -- Honey-bee mating optimization (HBMO) -- Invasive weed optimization (IWO) -- Central force optimization (CFO) -- Biogeography-based optimization (BBO) -- Firefly algorithm (FA) -- Gravity search algorithm (GSA) -- Bat algorithm (BA) -- Plant propagation algorithm (PPA) -- Water cycle algorithm (WCA) -- Symbiotic organisms search (SOS) -- Comprehensive evolutionary algorithm (CEA).…”
Full text (MFA users only)
Electronic eBook -
33
Building software for simulation : theory and algorithms, with applications in C++
Published 2011Full text (MFA users only)
Electronic eBook -
34
An Investigation into Authentication Security of GSM algorithm for Mobile Banking.
Published 2014Full text (MFA users only)
Electronic eBook -
35
Freudian unconscious and cognitive neuroscience : from unconscious fantasies to neural algorithms
Published 2009Full text (MFA users only)
Electronic eBook -
36
What to Do When Machines Do Everything : Five Ways Your Business Can Thrive in an Economy of Bots, AI, and Data.
Published 2017Table of Contents: “…What to Do When Machines Do Everything: How to Get Ahead in a World of AI, Algorithms, Bots, and Big Data; Contents; Preface; 1: When Machines Do Everything; Like It or Not, This Is Happening; Digital That Matters; Playing the New Game; But Will I Be Automated Away?…”
Full text (MFA users only)
Electronic eBook -
37
A guide to creating a successful algorithmic trading strategy
Published 2016Full text (MFA users only)
Electronic eBook -
38
Automating open source intelligence : algorithms for OSINT
Published 2016Table of Contents: “…Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 -- Ethical Considerations When Using Online Datasets for Research Purposes; Introduction.…”
Full text (MFA users only)
Electronic eBook -
39
Bayesian phylogenetics : methods, algorithms, and applications
Published 2014Table of Contents: “…Front Cover; Contents; List of Figures; List of Tables; Preface; Editors; Contributors; Chapter 1: Bayesian phylogenetics: methods, computational algorithms, and applications; Chapter 2: Priors in Bayesian phylogenetics; Chapter 3: Inated density ratio (IDR) method for estimating marginal likelihoods in Bayesian phylogenetics; Chapter 4: Bayesian model selection in phylogenetics and genealogy-based population genetics; Chapter 5: Variable tree topology stepping-stone marginal likelihood estimation; Chapter 6: Consistency of marginal likelihood estimation when topology varies.…”
Full text (MFA users only)
Electronic eBook -
40
Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto.
Published 2019Table of Contents: “…59 -- Cryptography Basics 59 -- Encryption 59 -- Integrity Hashing 72 -- Cryptographic Uses 73 -- How Quantum Computers Can Break Cryptography 74 -- Cutting Time 74 -- Quantum Algorithms 76 -- What Quantum Can and Can’t Break 79 -- Still Theoretical 82 -- Summary 83 -- 4 When Will the Quantum Crypto Break Happen? …”
Full text (MFA users only)
Electronic eBook