Search Results - (((((((ant OR wants) OR semantic) OR king) OR cantor) OR anne) OR plane) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 47
- Artificial intelligence 42
- Mathematics 34
- Machine learning 29
- Mathematical models 26
- Data mining 22
- artificial intelligence 21
- Algorithms 19
- Mathematical optimization 19
- algorithms 16
- Artificial Intelligence 14
- Computer science 14
- Python (Computer program language) 14
- Computer networks 12
- Information technology 12
- Technological innovations 12
- Data Mining 11
- Neural networks (Computer science) 11
- methods 10
- Automatic control 9
- Big data 9
- Image processing 9
- Machine Learning 9
- Application software 8
- Computer algorithms 8
- Development 8
- Digital techniques 8
- Graph theory 8
- Materials 8
- Computational linguistics 7
Search alternatives:
- ant »
- wants »
- semantic »
- cantor »
- plane »
-
441
D Cookbook.
Published 2014Table of Contents: “…Performing type conversionsFinding the largest files in a directory; Creating a network client and server; Using Base64 to create a data URI; Generating random numbers; Normalizing a string and performing Unicode comparisons; Searching with regular expressions; Writing a digest utility; Using std.zlib compression; Using the std.json module; Chapter 3: Ranges; Introduction; Using ranges when implementing an algorithm; Creating an input range; Creating an output range; Creating a higher-order range; Putting a range interface on a collection; Creating an input range over a tree structure…”
Full text (MFA users only)
Electronic eBook -
442
CCNA Security Study Guide : Exam 210-260.
Published 2018Table of Contents: “…-- Certification Exam Policies -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Understanding Security Fundamentals -- Goals of Security -- Network Topologies -- Common Network Security Zones -- Summary -- Exam Essentials -- Review Questions -- Chapter 2 Understanding Security Threats -- Common Network Attacks -- Social Engineering -- Malware -- Data Loss and Exfiltration -- Summary -- Exam Essentials -- Review Questions -- Chapter 3 Understanding Cryptography -- Symmetric and Asymmetric Encryption -- Hashing Algorithms -- Key Exchange -- Public Key Infrastructure -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Securing the Routing Process -- Securing Router Access -- Implementing OSPF Routing Update Authentication -- Securing the Control Plane -- Summary -- Exam Essentials -- Review Questions -- Chapter 5 Understanding Layer 2 Attacks -- Understanding STP Attacks -- Understanding ARP Attacks -- Understanding MAC Attacks -- Understanding CAM Overflows -- Understanding CDP/LLDP Reconnaissance -- Understanding VLAN Hopping -- Understanding DHCP Spoofing -- Summary -- Exam Essentials -- Review Questions -- Chapter 6 Preventing Layer 2 Attacks -- Configuring DHCP Snooping -- Configuring Dynamic ARP Inspection -- Configuring Port Security -- Configuring STP Security Features -- Disabling DTP -- Verifying Mitigations -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 VLAN Security -- Native VLANs -- PVLANs -- ACLs on Switches -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Securing Management Traffic.…”
Full text (MFA users only)
Electronic eBook -
443
The bitcoin big bang : how alternative currencies are about to change the world
Published 2014Table of Contents: “…; 8 Building the Nautiluscoin Economy; Dynamic Proof-of-Stake; Nautiluscoin Gross Domestic Product Target; Algorithmic Monetary Policy.…”
Full text (MFA users only)
Electronic eBook -
444
Exploratory data analysis with MATLAB
Published 2017Table of Contents: “…5.5.2 Probabilistic Latent Semantic Analysis5.6 Minimum Spanning Trees and Clustering; 5.6.1 Definitions; 5.6.2 Minimum Spanning Tree Clustering; 5.7 Evaluating the Clusters; 5.7.1 Rand Index; 5.7.2 Cophenetic Correlation; 5.7.3 Upper Tail Rule; 5.7.4 Silhouette Plot; 5.7.5 Gap Statistic; 5.7.6 Cluster Validity Indices; 5.8 Summary and Further Reading; Exercises; Chapter 6 Model-Based Clustering; 6.1 Overview of Model-Based Clustering; 6.2 Finite Mixtures; 6.2.1 Multivariate Finite Mixtures; 6.2.2 Component Models -- Constraining the Covariances; 6.3 Expectation-Maximization Algorithm.…”
Full text (MFA users only)
Electronic eBook -
445
Contemporary Ergonomics 1998.
Published 1998Table of Contents: “…Development of a questionnaire to measure attitudes towards virtual reality -- Orientation of blind users on the World Wide Web -- F̃lash, splash and crash:̃ Human factors and the implementation of innovative Web technologies -- Determining ergonomic factors in stress from work demands of nurses -- A risk assessment and control cycle approach to managing workplace stress -- Teleworking: Assessing the risks -- Evaluating teleworking -- case study -- Team organisational mental models: an integrative framework for research -- The impact of ITT on virtual team working in the European automotive industry -- The effect of communication processes upon workers and job efficiency -- A case study of job design in a steel plant -- The effects of age and habitual physical activity on the adjustment to nocturnal shiftwork -- Job design for university technicians: work activity and allocation of function -- Allocation of functions and manufacturing job design based on knowledge requirements -- The need to specify cognition within system requirements -- Analysis of complex communication tasks -- Health and safety as the basis for specifying information systems design requirements -- Cognitive algorithms -- Rapid prototyping in foam of 3D anthropometric computer models in functional postures -- The use of high and low level prototyping methods for product user interfaces -- Creative collaboration in engineering design teams -- Pleasure and product semantics -- A survey of usability practice and needs in Europe -- Cultural influence in usability assessment -- Interface display designs based on operator knowledge requirements -- Understanding what makes icons effective: how subjective ratings can inform design -- Representing uncertainty in decision support systems: the state of the art.…”
Full text (MFA users only)
Electronic eBook -
446
Pediatric incontinence : evaluation and clinical management
Published 2015Full text (MFA users only)
Electronic eBook -
447
Knowledge mining using intelligent agents
Published 2011Full text (MFA users only)
Electronic eBook -
448
Digital wealth : an automatic way to invest successfully
Published 2016Full text (MFA users only)
Electronic eBook -
449
Quasicrystals : a primer
Published 1997Table of Contents: “…Cover; Contents; 1 How to fill with atoms in condensed matter states; 1.1 Introduction; 1.2 Periodic structures; 1.2.1 Lattices, cells, bases, and space groups; 1.2.2 Atomic planes, rows, and indices; 1.2.3 The reciprocal lattice; 1.2.4 Experimental determination of crystal structures; 1.2.5 The notion of forbidden symmetries; 1.3 Liquids, glasses, and amorphous alloys; 1.3.1 Description of 'disordered' systems; 1.3.2 Diffraction with disordered systems; 1.4 Quasiperiodicity: another type of long-range order; 1.4.1 A one-dimensional example of non-periodic long-range order.…”
Full text (MFA users only)
Electronic eBook -
450
Digitalization of Society and Socio-Political Issues. 1, Digital, Communication, and Culture
Published 2019Table of Contents: “…The Digitalization of Cultural Policies in France 149; Anne BELLON 14.1.…”
Full text (MFA users only)
Electronic eBook -
451
Oracle SOA Suite 11g Performance Cookbook.
Published 2013Full text (MFA users only)
Electronic eBook -
452
Uncommon sense : investment wisdom since the stock market's dawn
Published 2015Table of Contents: “…-- NOTES -- 8 ARE COMPUTERS THE ANSWER? -- ALGORITHMS -- HIGH FREQUENCY TRADING -- THOMAS PETERFFY -- THINGS HAVEN'T ALWAYS BEEN SO FAST -- HOW FAST CAN IT GET? …”
Full text (MFA users only)
Electronic eBook -
453
Discovering knowledge in data : an introduction to data mining
Published 2014Table of Contents: “…DISCOVERING KNOWLEDGE IN DATA -- Contents -- Preface -- 1 An Introduction to Data Mining -- 1.1 What is Data Mining? -- 1.2 Wanted: Data Miners -- 1.3 The Need for Human Direction of Data Mining -- 1.4 The Cross-Industry Standard Practice for Data Mining -- 1.4.1 Crisp-DM: The Six Phases -- 1.5 Fallacies of Data Mining -- 1.6 What Tasks Can Data Mining Accomplish? …”
Full text (MFA users only)
Electronic eBook -
454
Building Machine Learning Systems with Python.
Published 2013Full text (MFA users only)
Electronic eBook -
455
Machine Learning in Chemical Safety and Health : Fundamentals with Applications.
Published 2022Table of Contents: “…Chapter 3 Flammability Characteristics Prediction Using QSPR Modeling -- 3.1 Introduction -- 3.1.1 Flammability Characteristics -- 3.1.2 QSPR Application -- 3.1.2.1 Concept of QSPR -- 3.1.2.2 Trends and Characteristics of QSPR -- 3.2 Flowchart for Flammability Characteristics Prediction -- 3.2.1 Dataset Preparation -- 3.2.2 Structure Input and Molecular Simulation -- 3.2.3 Calculation of Molecular Descriptors -- 3.2.4 Preliminary Screening of Molecular Descriptors -- 3.2.5 Descriptor Selection and Modeling -- 3.2.6 Model Validation -- 3.2.6.1 Model Fitting Ability Evaluation -- 3.2.6.2 Model Stability Analysis -- 3.2.6.3 Model Predictivity Evaluation -- 3.2.7 Model Mechanism Explanation -- 3.2.8 Summary of QSPR Process -- 3.3 QSPR Review for Flammability Characteristics -- 3.3.1 Flammability Limits -- 3.3.1.1 LFLT and LFL -- 3.3.1.2 UFLT and UFL -- 3.3.2 Flash Point -- 3.3.3 Auto-ignition Temperature -- 3.3.4 Heat of Combustion -- 3.3.5 Minimum Ignition Energy -- 3.3.6 Gas-liquid Critical Temperature -- 3.3.7 Other Properties -- 3.4 Limitations -- 3.5 Conclusions and Future Prospects -- References -- Chapter 4 Consequence Prediction Using Quantitative Property-Consequence Relationship Models -- 4.1 Introduction -- 4.2 Conventional Consequence Prediction Methods -- 4.2.1 Empirical Method -- 4.2.2 Computational Fluid Dynamics (CFD) Method -- 4.2.3 Integral Method -- 4.3 Machine Learning and Deep Learning-Based Consequence Prediction Models -- 4.4 Quantitative Property-Consequence Relationship Models -- 4.4.1 Consequence Database -- 4.4.2 Property Descriptors -- 4.4.3 Machine Learning and Deep Learning Algorithms -- 4.5 Challenges and Future Directions -- References -- Chapter 5 Machine Learning in Process Safety and Asset Integrity Management -- 5.1 Opportunities and Threats -- 5.2 State-of-the-Art Reviews -- 5.2.1 Artificial Neural Networks (ANNs).…”
Full text (MFA users only)
Electronic eBook -
456
Theoretical Computer Science : Proceedings of the 10th Italian Conference on ICTCS '07.
Published 2007Full text (MFA users only)
Electronic eBook -
457
Database technology for life sciences and medicine
Published 2010Full text (MFA users only)
Electronic eBook -
458
Graph drawing and applications for software and knowledge engineers
Published 2002Full text (MFA users only)
Electronic eBook -
459
Deep Learning with Pytorch Quick Start Guide : Learn to Train and Deploy Neural Network Models in Python.
Published 2018Full text (MFA users only)
Electronic eBook -
460
Sound waves : propagation, frequencies, and effects
Published 2012Table of Contents: “…CASE STUDIES -- 6. GENETIC ALGORITHM -- 7. RESULTS AND DISCUSSION -- 7.1. Results -- 7.1.1. …”
Full text (MFA users only)
Electronic eBook