Search Results - (((((((anti OR hands) OR granting) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 141
  2. 142

    Introduction to network security : theory and practice by Wang, Jie, 1961-

    Published 2015
    Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  3. 143

    Fundamentals of patenting and licensing for scientists and engineers by Ma, Matthew Y.

    Published 2009
    Table of Contents: “…Patenting beyond core algorithms. 5.4. Innovation harvesting. 5.5. Patent landscaping. 5.6. …”
    Full text (MFA users only)
    Electronic eBook
  4. 144

    Future Farming. by Shukla, Praveen Kumar

    Published 2023
    Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
    Full text (MFA users only)
    Electronic eBook
  5. 145

    Rough fuzzy image analysis : foundations and methodologies

    Published 2010
    Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
    Full text (MFA users only)
    Electronic eBook
  6. 146

    Applied Parallel Computing. by Deng, Yuefan

    Published 2012
    Table of Contents: “…Design of Algorithms; 5.1. Algorithm Models; 5.1.1. Master-slave; 5.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  7. 147

    Blockchain-based peer-to-peer transactions in energy systems by Nwulu, Nnamdi, Damisa, Uyikumhe

    Published 2023
    Table of Contents: “…Smart contract-based peer-to-peer energy storage-sharing architecture and algorithm -- 8.3. Smart contract functions for the storage-sharing scheme -- 8.4. …”
    Full text (MFA users only)
    Electronic eBook
  8. 148
  9. 149

    Multi-label dimensionality reduction by Liang Sun

    Published 2014
    Table of Contents: “…Cover; Series; Contents; Preface; Symbol Description; Chapter 1: Introduction; Chapter 2: Partial Least Squares; Chapter 3: Canonical Correlation Analysis; Chapter 4: Hypergraph Spectral Learning; Chapter 5: A Scalable Two-Stage Approach for Dimensionality Reduction; Chapter 6: A Shared-Subspace Learning Framework; Chapter 7: Joint Dimensionality Reduction and Classification; Chapter 8: Nonlinear Dimensionality Reduction: Algorithms and Applications; Appendix Proofs; References; Back Cover.…”
    Full text (MFA users only)
    Electronic eBook
  10. 150
  11. 151

    Elements of quantum computation and quantum communication by Pathak, Anirban

    Published 2013
    Table of Contents: “…; A brief history of quantum computation and quantum communication Basic Ideas of Classical and Quantum Computational Models and Complexity Classes; Elementary idea of complexity of an algorithm; Turing machine; Circuit model of computation; Computational complexity and related issues Mathematical Tools and Simple Quantum Mechanics Required for Quantum Computing; A little bit of algebra required for quantum computing; A little bit of quantum mechanics; A little more of algebra for quantum computing Quantum Gates and Quantum Circuits; Single qubit gates; Two qubit gates; Three qubit gates; A little more on quantum gates; Quantum circuits; Discussion Quantum Algorithms; Deutsch's algorithm; Deutsch.…”
    Full text (MFA users only)
    Electronic eBook
  12. 152

    Advances in nonlinear waves and symbolic computation by Yan, Zhenya

    Published 2009
    Table of Contents: “…Senthilnathan [and others] -- Direct methods and symbolic software for conservation laws of nonlinear equations / Willy Hereman [and others] -- Nonclassical potential symmetries for a nonlinear thermal wave equation / M.L. Gandarias -- Anti-dark solitons of the resonant nonlinear Schrödinger equation / D.W.C. …”
    Full text (MFA users only)
    Electronic eBook
  13. 153

    Hybrid intelligence for image analysis and understanding

    Published 2017
    Table of Contents: “…Pratihar -- A two-stage approach to handwritten indic script identification / Pawan Kumar Singh, Supratim Das, Ram Sarkar, Mita Nasipuri -- Feature extraction and segmentation techniques in static hand gesture recognition system / Subhamoy Chatterjee, Piyush Bhandari, Mahesh Kumar Kolekar -- SVM combination for an enhanced prediction of writer's soft-biometrics / Nesrine Bouadjenek, Hassiba Nemmour, Youcef Chibani -- Brain inspired machine intelligence for image analysis : convolutional neural networks / Siddharth Srivastava, Brejesh Lall -- Human behavioral analysis using evolutionary algorithms and deep learning / Earnest Paul Ijjina, C. …”
    Full text (MFA users only)
    Electronic eBook
  14. 154

    Differential algebra and related topics - proceedings of the international workshop. by SIT, WILLIAM Y.

    Published 2002
    Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
    Full text (MFA users only)
    Electronic eBook
  15. 155

    Computational models of argument : proceedings of COMMA 2014

    Published 2014
    Table of Contents: “…Properties of Random VAFs and Implications for Efficient AlgorithmsResolution-Based Grounded Semantics Revisited -- Decomposing Abstract Dialectical Frameworks -- A Principled Approach to the Implementation of Argumentation Models -- Combining Paraconsistent Logic with Argumentation -- Probabilistic Argument Graphs for Argumentation Lotteries -- Enthymeme Construction in Dialogues Using Shared Knowledge -- Strategies in Dialogues: A Game-Theoretic Approach -- Argumentation Logic -- Splitting Abstract Dialectical Frameworks…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  16. 156

    Trends in Functional Programming. by Nilsson, Henrik

    Published 2007
    Table of Contents: “…Front Cover; Preliminary Pages; Contents; Preface; Proving Termination Using Dependent Types: The Case of Xor-Terms; Proving the Correctness of Algorithmic Debugging for Functional Programs; Systematic Synthesis of Functions; A Purely Functional Implementation of ROBDDs in Haskell; Efficient Interpretation by Transforming Data Types and Patterns to Functions; Object-Oriented Programming in Dependent Type Theory; A Sharing Analysis for SAFE; Memory Usage Improvement Using Runtime Alias Detection; A Model of Functional Programming with Dynamic Compilation and Optimization.…”
    Full text (MFA users only)
    Electronic eBook
  17. 157

    Twitter and tear gas : the power and fragility of networked protest by Tufekci, Zeynep

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  18. 158

    Communication System Security.

    Published 2012
    Table of Contents: “…Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. …”
    Full text (MFA users only)
    Electronic eBook
  19. 159

    Discovering knowledge in data : an introduction to data mining by Larose, Daniel T.

    Published 2014
    Table of Contents: “…11.2 Kohonen Networks -- 11.2.1 Kohonen Networks Algorithm -- 11.3 Example of a Kohonen Network Study -- 11.4 Cluster Validity -- 11.5 Application of Clustering Using Kohonen Networks -- 11.6 Interpreting the Clusters -- 11.6.1 Cluster Profiles -- 11.7 Using Cluster Membership as Input to Downstream Data Mining Models -- THE R ZONE -- References -- Exercises -- Hands-On Analysis -- 12 Association Rules -- 12.1 Affinity Analysis and Market Basket Analysis -- 12.1.1 Data Representation for Market Basket Analysis -- 12.2 Support, Confidence, Frequent Itemsets, and the a Priori Property -- 12.3 How Does the a Priori Algorithm Work? …”
    Full text (MFA users only)
    Electronic eBook
  20. 160

    Practical Machine Learning in R. by Nwanganga, Fred

    Published 2020
    Full text (MFA users only)
    Electronic eBook