Search Results - (((((((ant OR wantis) OR wanted) OR carter) OR cantor) OR anne) OR when) OR wanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 38
- Data processing 35
- Machine learning 29
- artificial intelligence 26
- Mathematical models 22
- Mathematics 22
- Data mining 21
- Mathematical optimization 21
- Artificial Intelligence 18
- Algorithms 16
- algorithms 16
- methods 16
- Python (Computer program language) 15
- Social aspects 14
- Application software 13
- Development 13
- Technological innovations 13
- Computer networks 12
- Data Mining 12
- Neural networks (Computer science) 12
- Computer algorithms 10
- Research 10
- Design and construction 9
- Diseases 9
- Electronic data processing 9
- History 9
- Information technology 9
- Big data 8
- Machine Learning 8
- Statistical methods 8
Search alternatives:
- ant »
- wantis »
- wanted »
- cantor »
- wanting »
-
21
Algorithmics of matching under preferences
Published 2013Full text (MFA users only)
Electronic eBook -
22
Metaheuristic optimization for the design of automatic control laws
Published 2013Table of Contents: “…Ant colony optimization…”
Full text (MFA users only)
Electronic eBook -
23
Introduction to programming : learn to program in Java with data structures, algorithms, and logic
Published 2018Full text (MFA users only)
Electronic eBook -
24
-
25
Data Structure and Algorithms Using C++ : A Practical Implementation.
Published 2021Table of Contents: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- 1 Introduction to Data Structure -- 1.1 Definition and Use of Data Structure -- 1.2 Types of Data Structure -- Linear Data Structures -- Non-Linear Data Structure -- Operations Performed in Data Structure -- 1.3 Algorithm -- Steps Required to Develop an Algorithm -- Mathematical Notations and Functions -- Algorithemic Notations -- 1.4 Complexity of an Algorithm -- Space Complexity -- Time Complexity -- Best Case -- Worst Case -- Average Case -- 1.5 Efficiency of an Algorithm…”
Full text (MFA users only)
Electronic eBook -
26
Algorithmic Graph Theory and Perfect Graphs.
Published 2014Table of Contents: “…The Design of Efficient Algorithms; 1. The Complexity of Computer Algorithms; 2. …”
Full text (MFA users only)
Electronic eBook -
27
Network and discrete location : models, algorithms, and applications
Published 2013Full text (MFA users only)
Electronic eBook -
28
-
29
Meta-heuristic and evolutionary algorithms for engineering optimization
Published 2017Table of Contents: “…Overview of optimization -- Introduction to meta-heuristic and evolutionary algorithms -- Pattern search (PS) -- Genetic algorithm (GA) -- Simulated annealing (SA) -- Tabu search (TS) -- Ant colony optimization (ACO) -- Particle swarm optimization (PSO) -- Differential evolution (DE) -- Harmony search (HS) -- Shuffled frog-leaping algorithm (SFLA) -- Honey-bee mating optimization (HBMO) -- Invasive weed optimization (IWO) -- Central force optimization (CFO) -- Biogeography-based optimization (BBO) -- Firefly algorithm (FA) -- Gravity search algorithm (GSA) -- Bat algorithm (BA) -- Plant propagation algorithm (PPA) -- Water cycle algorithm (WCA) -- Symbiotic organisms search (SOS) -- Comprehensive evolutionary algorithm (CEA).…”
Full text (MFA users only)
Electronic eBook -
30
Building software for simulation : theory and algorithms, with applications in C++
Published 2011Full text (MFA users only)
Electronic eBook -
31
We are data : algorithms and the making of our digital selves
Published 2017Table of Contents: “…-- Privacy: wanted dead or alive -- Conclusion: ghosts in the machine.…”
Full text (MFA users only)
Electronic eBook -
32
An Investigation into Authentication Security of GSM algorithm for Mobile Banking.
Published 2014Full text (MFA users only)
Electronic eBook -
33
What to Do When Machines Do Everything : Five Ways Your Business Can Thrive in an Economy of Bots, AI, and Data.
Published 2017Table of Contents: “…What to Do When Machines Do Everything: How to Get Ahead in a World of AI, Algorithms, Bots, and Big Data; Contents; Preface; 1: When Machines Do Everything; Like It or Not, This Is Happening; Digital That Matters; Playing the New Game; But Will I Be Automated Away?…”
Full text (MFA users only)
Electronic eBook -
34
A guide to creating a successful algorithmic trading strategy
Published 2016Full text (MFA users only)
Electronic eBook -
35
Automating open source intelligence : algorithms for OSINT
Published 2016Table of Contents: “…Graph Analysis for OSINTStructural Observations; Density of a Graph; Neighborhood, Degree, Average Degree, and Degree Distribution; Paths and Average Path Length; Components; Characterizing Position of Nodes; Betweenness Centrality; Closeness Centrality; Structures and Communities of Nodes; Structural Patterns: Cliques and Cores; Communities; Modularity; Twitter Case Study; The Twitter Dataset; General Graph Metrics; Node Metrics and Profiles' Centrality; Communities; Conclusion; References; Chapter 8 -- Ethical Considerations When Using Online Datasets for Research Purposes; Introduction.…”
Full text (MFA users only)
Electronic eBook -
36
Bayesian phylogenetics : methods, algorithms, and applications
Published 2014Table of Contents: “…Front Cover; Contents; List of Figures; List of Tables; Preface; Editors; Contributors; Chapter 1: Bayesian phylogenetics: methods, computational algorithms, and applications; Chapter 2: Priors in Bayesian phylogenetics; Chapter 3: Inated density ratio (IDR) method for estimating marginal likelihoods in Bayesian phylogenetics; Chapter 4: Bayesian model selection in phylogenetics and genealogy-based population genetics; Chapter 5: Variable tree topology stepping-stone marginal likelihood estimation; Chapter 6: Consistency of marginal likelihood estimation when topology varies.…”
Full text (MFA users only)
Electronic eBook -
37
Turing's vision : the birth of computer science
Published 2016Full text (MFA users only)
Electronic eBook -
38
Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto.
Published 2019Table of Contents: “…59 -- Cryptography Basics 59 -- Encryption 59 -- Integrity Hashing 72 -- Cryptographic Uses 73 -- How Quantum Computers Can Break Cryptography 74 -- Cutting Time 74 -- Quantum Algorithms 76 -- What Quantum Can and Can’t Break 79 -- Still Theoretical 82 -- Summary 83 -- 4 When Will the Quantum Crypto Break Happen? …”
Full text (MFA users only)
Electronic eBook -
39
Mastering machine learning with R : advanced prediction, algorithms, and learning methods with R 3.x
Published 2017Full text (MFA users only)
Electronic eBook -
40