Search Results - (((((((ant OR wikant) OR wantsi) OR arts) OR cantor) OR anne) OR maarten) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Mathematical models 39
- Data processing 37
- Artificial intelligence 29
- Mathematical optimization 27
- Machine learning 24
- Mathematics 22
- artificial intelligence 18
- Algorithms 16
- Computer networks 14
- algorithms 14
- Data mining 12
- Digital techniques 12
- Artificial Intelligence 11
- History 11
- Computer simulation 10
- Information technology 10
- Management 10
- Neural networks (Computer science) 10
- Bioinformatics 9
- Philosophy 9
- Security measures 9
- Computational Biology 8
- Computer algorithms 8
- Design and construction 8
- Machine Learning 8
- Social aspects 8
- Technological innovations 8
- Computer programming 7
- Data Mining 7
- Diseases 7
Search alternatives:
- ant »
- wikant »
- wantsi »
- cantor »
- arts »
-
441
-
442
-
443
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
Full text (MFA users only)
Electronic eBook -
444
Semantic matchmaking with nonmonotonic description logics
Published 2009Full text (MFA users only)
Electronic eBook -
445
3D face modeling, analysis and recognition
Published 2013Table of Contents: “…4 3D Morphable Models for Face Surface Analysis and Recognition4.1 Introduction; 4.2 Data Sets; 4.3 Face Model Fitting; 4.3.1 Distance Measure; 4.3.2 Iterative Face Fitting; 4.3.3 Coarse Fitting; 4.3.4 Fine Fitting; 4.3.5 Multiple Components; 4.3.6 Results; 4.4 Dynamic Model Expansion; 4.4.1 Bootstrapping Algorithm; 4.4.2 Results; 4.5 Face Matching; 4.5.1 Comparison; 4.5.2 Results; 4.6 Concluding Remarks; Exercises; References; 5 Applications; 5.1 Introduction; 5.2 3D Face Databases; 5.3 3D Face Recognition; 5.3.1 Challenges of 3D Face Recognition; 5.3.2 3D Face Recognition: State of the Art.…”
Full text (MFA users only)
Electronic eBook -
446
Qualitative computing : a computational journey into nonlinearity
Published 2012Full text (MFA users only)
Electronic eBook -
447
-
448
Recent advances in computational sciences : selected papers from the International Workshop on Computational Sciences and its Education, Beijing, China, 29-31 August 2005
Published 2008Full text (MFA users only)
Electronic Conference Proceeding eBook -
449
Emerging trends in advanced science : selected, peer reviewed papers from the International Conference on Emerging Trends in Science, Engineering and Technology (ICETSET-2014), Apr...
Published 2014Full text (MFA users only)
Electronic Conference Proceeding eBook -
450
The post-screen through virtual reality, holograms and light projections : where screen boundaries lie
Published 2021Full text (MFA users only)
Electronic eBook -
451
-
452
Introduction to finite strain theory for continuum elasto-plasticity
Published 2013Full text (MFA users only)
Electronic eBook -
453
Atlas of minimally invasive surgery for lung and esophageal cancer
Published 2017Full text (MFA users only)
Electronic eBook -
454
-
455
Computational Paralinguistics : Emotion, Affect and Personality in Speech and Language Processing.
Published 2013Full text (MFA users only)
Electronic eBook -
456
Practical Raman spectroscopy : an introduction
Published 2013Full text (MFA users only)
Electronic eBook -
457
Cooperative and cognitive satellite systems
Published 2015Full text (MFA users only)
Electronic eBook -
458
Techniques for Noise Robustness in Automatic Speech Recognition.
Published 2012Full text (MFA users only)
Electronic eBook -
459
Understanding smart sensors
Published 2013Table of Contents: “…ZigBee-Like Wireless -- 8.3.3. ANT+ -- 8.3.4.6LoWPAN -- 8.3.5. Near Field Communication (NFC) -- 8.3.6.Z-Wave -- 8.3.7. …”
Full text (MFA users only)
Electronic eBook -
460
Sliding Mode Control of Uncertain Parameter-Switching Hybrid Systems.
Published 2014Full text (MFA users only)
Electronic eBook