Search Results - (((((((ante OR want) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 46
- Artificial intelligence 44
- Machine learning 35
- Mathematics 32
- Mathematical models 29
- artificial intelligence 28
- Algorithms 25
- Data mining 25
- Mathematical optimization 24
- algorithms 24
- Technological innovations 20
- Artificial Intelligence 19
- Computer networks 19
- Computer algorithms 17
- methods 17
- Application software 16
- Development 16
- Information technology 16
- Big data 15
- Python (Computer program language) 15
- Social aspects 15
- Data Mining 14
- Management 13
- Electronic data processing 12
- Neural networks (Computer science) 12
- Research 12
- Computer science 10
- Design and construction 10
- History 10
- Wireless communication systems 10
Search alternatives:
-
321
Automated database applications testing : specification representation for automated reasoning
Published 2010Table of Contents: “…Software testing definitions. 1.4. When should testing start in the software lifecycle? …”
Full text (MFA users only)
Electronic eBook -
322
Online engineering
Published 2009Table of Contents: “…THE COVARIANCE INTERSECTION ALGORITHM; 6. LARGEST ELLIPSOID ALGORITHM; 6.1. The Intersection Problem; 6.2. …”
Full text (MFA users only)
Electronic eBook -
323
Artificial intelligence for big data : complete guide to automating big data solutions using artificial intelligence techniques.
Published 2018Table of Contents: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept.…”
Full text (MFA users only)
Electronic eBook -
324
Medical data privacy handbook
Published 2015Table of Contents: “…Introduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue.…”
Full text (MFA users only)
Electronic eBook -
325
-
326
Scala for Machine Learning - Second Edition.
Published 2017Full text (MFA users only)
Electronic eBook -
327
Infectious diseases in pediatric otolaryngology : a practical guide
Published 2016Full text (MFA users only)
Electronic eBook -
328
Progress reports on impedance spectroscopy : measurements, modeling, and application
Published 2017Full text (MFA users only)
Electronic eBook -
329
Automatic control in power generation, distribution, and protection : proceedings of the IFAC Symposium, Pretoria, Republic of South Africa, 15-19 September 1980
Published 1981Table of Contents: “…COMPUTER AIDED DESIGN OF CONTROL ALGORITHMS…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
330
Communicating mathematics : a conference in honor of Joseph A. Gallian's 65th birthday, July 16-19, 2007, University of Minnesota, Duluth, Minnesota
Published 2009Table of Contents: “…; ""McKay's canonical graph labeling algorithm""; ""A multiplicative deformation of the Möbius function for the poset of partitions of a multiset""…”
Full text (MFA users only)
Electronic eBook -
331
Cryptography : protocols, design, and applications
Published 2012Table of Contents: “…Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. …”
Full text (MFA users only)
Electronic eBook -
332
Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics
Published 2016Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
Full text (MFA users only)
Electronic eBook -
333
Computational models of argument : proceedings of COMMA 2014
Published 2014Table of Contents: “…Properties of Random VAFs and Implications for Efficient AlgorithmsResolution-Based Grounded Semantics Revisited -- Decomposing Abstract Dialectical Frameworks -- A Principled Approach to the Implementation of Argumentation Models -- Combining Paraconsistent Logic with Argumentation -- Probabilistic Argument Graphs for Argumentation Lotteries -- Enthymeme Construction in Dialogues Using Shared Knowledge -- Strategies in Dialogues: A Game-Theoretic Approach -- Argumentation Logic -- Splitting Abstract Dialectical Frameworks…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
334
Oracle SOA Suite 11g Performance Cookbook.
Published 2013Full text (MFA users only)
Electronic eBook -
335
Elements of algebraic coding systems
Published 2014Table of Contents: “…Constructing f-reducing polynomials -- 7.1 Introduction -- 7.2 Factoring polynomials over large finite fields -- 7.2.1 Resultant -- 7.2.2 Algorithm for factorization based on the resultant -- 7.2.3 The Zassenhaus algorithm -- 7.3 Finding roots of polynomials over finite fields -- 7.3.1 Finding roots when p is large -- 7.3.2 Finding roots when q = pm is large but p is small -- 7.4 Problems with solutions.…”
Full text (MFA users only)
Electronic eBook -
336
Convergence : the redesign of design
Published 2017Table of Contents: “…The Point Where All of the Intelligence Converges ENDNOTES; IMAGES; CHAPTER 4 PARAMETRICS AND COMPUTATION ; BIM Tools ; Challenges to the Convergence ; Computational Tools ; On the Evolution of a Parametric/Computational Convergence ; Simulation and Automation ; The Algorithm of Everything ; Algorithms and Machine Learning ; ENDNOTES; IMAGES; CHAPTER 5 VIRTUAL AND PHYSICAL ; Advances in Virtual Reality ; VR and Reality Capture ; Reality Computing ; Uses for VR in Architecture ; VR and AR in Architecture, Engineering, and Construction ; Leveraging Video Games in AEC.…”
Full text (MFA users only)
Electronic eBook -
337
Digital wealth : an automatic way to invest successfully
Published 2016Full text (MFA users only)
Electronic eBook -
338
Approximate dynamic programming : solving the curses of dimensionality
Published 2011Full text (MFA users only)
Electronic eBook -
339
Mount Sinai expert guides. Gastroenterology
Published 2014Full text (MFA users only)
Electronic eBook -
340
Code halos : how the digital lives of people, things, and organizations are changing the rules of business
Published 2014Table of Contents: “…The "Skinterface" Will Change the Consumer ExperienceIndustrial Amplifiers: Harnessing the Power of the Internet of Things; Smart Appliances Become Amplifiers in the Home; The Application Interface: Window to a Beautiful Experience; The Algorithm: Data Becomes Meaning; Facebook's EdgeRank Algorithm Makes It Personal; Successful Algorithms Power Code Connections and Create Insight; All Data, Great and Small; Netflix Lassos Data to Win in the Market; New Business Models Showcase Code Halo Value; Why Didn't They Tune in the Zune?…”
Full text (MFA users only)
Electronic eBook