Search Results - (((((((ant OR wanti) OR mantis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 41
- Data processing 39
- Mathematics 31
- Mathematical models 27
- Machine learning 26
- artificial intelligence 26
- Algorithms 25
- algorithms 24
- Mathematical optimization 23
- Data mining 21
- Technological innovations 20
- Artificial Intelligence 17
- Computer algorithms 17
- Computer networks 17
- Information technology 16
- Big data 14
- Social aspects 14
- Management 13
- methods 13
- Development 12
- Research 12
- Data Mining 11
- Application software 10
- Design and construction 10
- Electronic data processing 10
- History 10
- Neural networks (Computer science) 10
- Diseases 9
- Philosophy 9
- Python (Computer program language) 9
Search alternatives:
- ant »
- wanti »
- mantis »
- cantor »
-
261
-
262
Bladder Cancer : diagnosis and clinical management
Published 2015Full text (MFA users only)
Electronic eBook -
263
Computational models of argument : proceedings of COMMA 2014
Published 2014Table of Contents: “…Properties of Random VAFs and Implications for Efficient AlgorithmsResolution-Based Grounded Semantics Revisited -- Decomposing Abstract Dialectical Frameworks -- A Principled Approach to the Implementation of Argumentation Models -- Combining Paraconsistent Logic with Argumentation -- Probabilistic Argument Graphs for Argumentation Lotteries -- Enthymeme Construction in Dialogues Using Shared Knowledge -- Strategies in Dialogues: A Game-Theoretic Approach -- Argumentation Logic -- Splitting Abstract Dialectical Frameworks…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
264
Constraint Solving over Multi-valued Logics : Application to Digital Circuits.
Published 2002Full text (MFA users only)
Electronic eBook -
265
-
266
Social sensing : building reliable systems on unreliable data
Published 2015Table of Contents: “…4.3.2 Source Credibility4.4 The Iterative Algorithm; 4.5 Examples and Results; 4.6 Discussion; Appendix; Chapter 5: Social Sensing: A maximum likelihood estimation approach; 5.1 The Social Sensing Problem; 5.2 Expectation Maximization; 5.2.1 Background; 5.2.2 Mathematical Formulation; 5.2.3 Deriving the E-Step and M-Step; 5.3 The EM Fact-Finding Algorithm; 5.4 Examples and Results; 5.4.1 A Simulation Study; 5.4.2 A Geotagging Case Study; 5.4.3 A Real World Application; 5.5 Discussion; Chapter 6: Confidence bounds in social sensing; 6.1 The Reliability Assurance Problem.…”
Full text (MFA users only)
Electronic eBook -
267
Computing the homology of the lambda algebra
Published 1985Table of Contents: “…Corollaries to the structure formulas""; ""2.6. Tri-grading when p is odd""; ""2.7. The endomorphism Î?""; ""2.8. …”
Full text (MFA users only)
Electronic eBook -
268
Cystic Tumors of the Pancreas : Diagnosis and Treatment
Published 2016Full text (MFA users only)
Electronic eBook -
269
More and different : notes from a thoughtful curmudgeon
Published 2011Full text (MFA users only)
Electronic eBook -
270
Atlas of AI : power, politics, and the planetary costs of artificial intelligence
Published 2021Full text (MFA users only)
Electronic eBook -
271
Solving transport problems : towards green logistics
Published 2019Full text (MFA users only)
Electronic eBook -
272
Artificial Neural Network Applications for Software Reliability Prediction.
Published 2017Full text (MFA users only)
Electronic eBook -
273
Artificial intelligent techniques for electric and hybrid electric vehicles
Published 2020Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
Full text (MFA users only)
Electronic eBook -
274
Data analytics and big data
Published 2018Table of Contents: “…When real time makes the difference; 4.4. What should data analytics address?…”
Full text (MFA users only)
Electronic eBook -
275
Automated database applications testing : specification representation for automated reasoning
Published 2010Table of Contents: “…Software testing definitions. 1.4. When should testing start in the software lifecycle? …”
Full text (MFA users only)
Electronic eBook -
276
Advanced manufacturing technology and systems : selected, peer reviewed papers from the 2012 International Conference on Advanced Manufacturing Technology and Systems (AMTS 2012),...
Published 2012Table of Contents: “…A Study on Corrosion Resistance and Weatherability of Fluorocarbon Anti-Corrosion Coatings for External Surface of Ocean PlatformA Study on the Mechanical Properties of Polymer-Ceramic Composite Using Injection Moulding; An Enhanced Resolution Three-Dimensional Transformation Method Based on Discrete Wavelet Transform; An Entropy Based Analytical Model for Thermoelastic Damping in Micromechanical Resonators; An Improved Ant Colony Optimization for Large-Scale Simple Assembly Line Balancing Problem of Type-1…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
277
Online engineering
Published 2009Table of Contents: “…THE COVARIANCE INTERSECTION ALGORITHM; 6. LARGEST ELLIPSOID ALGORITHM; 6.1. The Intersection Problem; 6.2. …”
Full text (MFA users only)
Electronic eBook -
278
Medical data privacy handbook
Published 2015Table of Contents: “…Introduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue.…”
Full text (MFA users only)
Electronic eBook -
279
-
280
Infectious diseases in pediatric otolaryngology : a practical guide
Published 2016Full text (MFA users only)
Electronic eBook