Search Results - (((((((ant OR wantsa) OR wkante) OR art) OR cantor) OR anne) OR cartsr) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Mathematical models 39
- Data processing 37
- Artificial intelligence 29
- Mathematical optimization 27
- Machine learning 24
- Mathematics 22
- artificial intelligence 18
- Algorithms 16
- Computer networks 14
- algorithms 14
- Data mining 12
- Digital techniques 12
- Artificial Intelligence 11
- History 11
- Computer simulation 10
- Information technology 10
- Management 10
- Neural networks (Computer science) 10
- Bioinformatics 9
- Philosophy 9
- Security measures 9
- Computational Biology 8
- Computer algorithms 8
- Design and construction 8
- Machine Learning 8
- Social aspects 8
- Technological innovations 8
- Computer programming 7
- Data Mining 7
- Diseases 7
Search alternatives:
- ant »
- wantsa »
- wkante »
- cantor »
- cartsr »
-
161
Java programming interviews exposed
Published 2014Table of Contents: “…Chapter 18: Useful LibrariesRemoving Boilerplate Code with Apache Commons; Developing with Guava Collections; Using Joda Time; Summary; Chapter 19: Developing with Build Tools; Building Applications with Maven; Ant; Summary; Chapter 20: Android; Basics; User Interface; Persistence; Android Hardware; Summary; Appendix: Introducing Scala; Scala Basics; Functions as Values; Immutability; Summary; Index.…”
Full text (MFA users only)
Electronic eBook -
162
Pattern Recognition in Computational Molecular Biology : Techniques and Approaches
Published 2015Table of Contents: “…Wiley Series; Title Page; Copyright; Table of Contents; List of Contributors; Preface; Part 1: Pattern Recognition in Sequences; Chapter 1: Combinatorial Haplotyping Problems; 1.1 Introduction; 1.2 Single Individual Haplotyping; 1.3 Population Haplotyping; References; Chapter 2: Algorithmic Perspectives of the String Barcoding Problems; 2.1 Introduction; 2.2 Summary of Algorithmic Complexity Results for Barcoding Problems; 2.3 Entropy-Based Information Content Technique for Designing Approximation Algorithms for String Barcoding Problems.…”
Full text (MFA users only)
Electronic eBook -
163
-
164
Introduction to graph theory
Published 2009Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
Full text (MFA users only)
Electronic eBook -
165
Applied mechatronics and android robotics : selected, peer reviewed papers from the International Conference on Applied Mechatronics and Android Robotics (ICAMAR 2013), July 13-14,...
Published 2013Table of Contents: “…Applied Mechatronics and Android Robotics; Preface, Committees and Sponsors; Table of Contents; Chapter 1: Robot Design, Motion Planning and Robot Control; Design of a Master Manipulator with Dynamical Simplification for Master-Slave Robot; Parameter Self-Adjusting Path Tracking Algorithm of Mobile Robots; Global Path Planning for Mobile Robot Based on Improved Ant Colony Algorithms; A Study of Robot Platform Based on WiFi Remote Control; Fire Detection System Based-On Mobile Robots; Phase Plane Analysis of Battery Series Balancing on Robot…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
166
-
167
Particle swarm optimisation : classical and quantum perspectives
Published 2012Full text (MFA users only)
Electronic eBook -
168
Remote Sensing of Energy Fluxes and Soil Moisture Content.
Published 2013Full text (MFA users only)
Electronic eBook -
169
Principles of artificial neural networks
Published 2013Table of Contents: “…Fundamentals of biological neural networks -- ch. 3. Basic principles of ANNs and their early structures. 3.1. Basic principles of ANN design. 3.2. …”
Full text (MFA users only)
Electronic eBook -
170
-
171
Slantwise moves : games, literature, and social invention in nineteenth-century America
Published 2018Full text (MFA users only)
Electronic eBook -
172
Learning OWL class expressions
Published 2010Table of Contents: “…Refinement Operator Based OWL Learning Algorithms; OCEL (OWL Class Expression Learner); Redundancy Elimination; Creating a Full Learning Algorithm; ELTL (EL Tree Learner)…”
Full text (MFA users only)
Electronic eBook -
173
Insect media : an archaeology of animals and technology
Published 2010Table of Contents: “…Introduction: insects in the age of technology -- Nineteenth-century insect technics the uncanny affects of insects -- Genesis of form: insect architecture and swarms -- Technics of nature and temporality: Uexküll's ethology -- Metamorphosis, intensity, and devouring space: elements for an insect game theory -- Intermezzo -- Animal ensembles, robotic affects: bees, milieus, and individuation -- Biomorphs and boids: swarming algorithms -- Sexual selection in the biodigital: teknolust and the weird life of SRAs -- Epilogue insect media as an art of transmutation.…”
Full text (MFA users only)
Electronic eBook -
174
An Eulerian Discontinuous Galerkin Method for the Numerical Simulation of Interfacial Transport.
Published 2017Table of Contents: “…List of Figures; Nomenclature; List of Tables; Nomenclature; 1 Introduction; 2 Equations of the Physical Model; 3 State of the Art of Numerical Methods; 4 An Introduction to DG Methods; 5 New Conservation Laws of SurfaceTransport Equations; 6 Exact Solutions to the Interfacial Surfactant Transport Equation; 7 A Narrow Band Method for the Eulerian Approach; 8 The Eulerian DG Algorithm and Numerical Results; 9 Conclusion; A Appendix.…”
Full text (MFA users only)
Electronic eBook -
175
-
176
Optimization in polymer processing
Published 2011Table of Contents: “…INTRODUCTION ; 2. STATE-OF-THE-ART ; 3. OPTIMIZATION METHODOLOGY.…”
Full text (MFA users only)
Electronic eBook -
177
Modelling for coastal hydraulics and engineering
Published 2010Full text (MFA users only)
Electronic eBook -
178
Introduction to network security : theory and practice
Published 2015Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
Full text (MFA users only)
Electronic eBook -
179
Digital signal processing with kernel methods
Published 2018Full text (MFA users only)
Electronic eBook -
180
Advances in digital technologies : proceedings of the 6th International Conference on Applications of Digital Information and Web Technologies 2015
Published 2015Table of Contents: “…Application of Genetic Algorithms to Context-Sensitive Text MiningA Decision Tree Classification Model for Determining the Location for Solar Power Plant; A Framework for Multi-Label Learning Using Label Ranking and Correlation; A Comparative Analysis of Pruning Methods for C4.5 and Fuzzy C4.5; Subject Index; Author Index.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook