Search Results - (((((((anti OR hands) OR granting) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 161
  2. 162

    DSP with Python Programming. by Charbit, Maurice

    Published 2017
    Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  3. 163

    Simulation and Modeling Related to Computational Science and Robotics Technology. by Kojima, F.

    Published 2012
    Table of Contents: “…Teleoperation of Universal Robot Hand with Pinching Force StabilizationObject Manipulation Based on Tactile Information of Multi-Fingered Robot Hand; Displacement and Force Measurement, Vibration Detection by Magnetic Type Tactile Sensor; Applications; Saliency-Based Geographics Annotation for Robotic Access to Naturally Complex Scenes; Monitoring Method for Underground Condition; Exact Pipe Wall Thinning Management with Flow Accelerated Corrosion Using Electro-Magnetic Acoustic Transducer; Subject Index; Author Index…”
    Full text (MFA users only)
    Electronic eBook
  4. 164

    Nonunions : diagnosis, evaluation and management by Agarwal, Animesh

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  5. 165

    Advanced Printing and Packaging Materials and Technologies

    Published 2015
    Table of Contents: “…An Automatic Calculation Method of MTF and the Application in Blurred Images Restoration; An Image Anti-Forgery Algorithm Based on Conceal Zone Special Halftoning; An Improved Print-Scan Resistant Watermarking Scheme; Research on the Character and Line Quality Evaluation Model Based on Human Visual System; Researches on Text Image Watermarking Scheme Based on the Structure of Character Glyph; A Novel Approach of Edge Detection Based on Gray Correlation Degree and Kirsch Operator; A Novel Digital Watermark Algorithm Based on a Fingerprint Image.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 166

    Focus on artificial neural networks

    Published 2011
    Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
    Full text (MFA users only)
    Electronic eBook
  7. 167

    Big Data and HPC. by Grandinetti, L.

    Published 2018
    Table of Contents: “…Analysis and Design of IoT Based Physical Location Monitoring SystemAutonomous Task Scheduling for Fast Big Data Processing; Adaptive Resource Management for Distributed Data Analytics; HPC Challenges; High-Performance Massive Subgraph Counting Using Pipelined Adaptive-Group Communication; Final Parallel and Distributed Computing Assignment for Master Students: Description of the Properties and Parallel Structure of Algorithms; Parallel Motion Estimation Based on GPU and Combined GPU-CPU; GPU-Based Iterative Hill Climbing Algorithm to Solve Symmetric Traveling Salesman Problem.…”
    Full text (MFA users only)
    Electronic eBook
  8. 168

    Industrial control systems

    Published 2011
    Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
    Full text (MFA users only)
    Electronic eBook
  9. 169

    Automata and Computability. by Kozen, Dexter, 1951-

    Published 1997
    Table of Contents: “…Miscellaneous Exercises Turing Machines and Effective ComputabilityHints for Selected Miscellaneous Exercises; Solutions to Selected Miscellaneous Exercises; References; Notation and Abbreviations; Index.…”
    Full text (MFA users only)
    Electronic eBook
  10. 170
  11. 171

    Data Science : The Executive Summary - a Technical Book for Non-Technical Professionals. by Cady, Field

    Published 2020
    Table of Contents: “…Chapter 3 Working with Modern Data -- 3.1 Unstructured Data and Passive Collection -- 3.2 Data Types and Sources -- 3.3 Data Formats -- 3.3.1 CSV Files -- 3.3.2 JSON Files -- 3.3.3 XML and HTML -- 3.4 Databases -- 3.4.1 Relational Databases and Document Stores -- 3.4.2 Database Operations -- 3.5 Data Analytics Software Architectures -- 3.5.1 Shared Storage -- 3.5.2 Shared Relational Database -- 3.5.3 Document Store + Analytics RDB -- 3.5.4 Storage + Parallel Processing -- Chapter 4 Telling the Story, Summarizing Data -- 4.1 Choosing What to Measure…”
    Full text (MFA users only)
    Electronic eBook
  12. 172
  13. 173
  14. 174

    Routledge Handbook of Arabic Translation by Hanna, Sameh

    Published 2019
    Table of Contents: “…The Arabic-IPA mapping algorithm and transcription tool: overviewThe SALMA Tagger; The two-stage mapping algorithm: SALMA pre-processing; The two-stage mapping algorithm: the rule-development stage; Further challenges and examples in full-form Arabic-IPA transcription; Automatically generated syllabified IPA transcriptions of Arabic words; Automatic assignment of primary stress; Automating stress assignment in pause form pronunciation; The tajwīd concept of prolongation or madd; Evaluation of automatic stress assignment over Quranic Arabic; Measuring inter-annotator agreement…”
    Full text (MFA users only)
    Electronic eBook
  15. 175

    The Method of Fundamental Solutions. by LI, Zi-Cai

    Published 2023
    Full text (MFA users only)
    Electronic eBook
  16. 176

    Learning OpenCV 3 Application Development. by Datta, Samyak

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  17. 177

    Apache Spark for Data Science Cookbook. by Chitturi, Padma Priya

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  18. 178

    Stairs 2006 : Proceedings of the Third Starting AI Researchers' Symposium

    Published 2006
    Table of Contents: “…A Comparison of Two Machine-Learning Techniques to Focus the Diagnosis TaskArgumentation Semantics for Temporal Defeasible Logic; NEWPAR: An Optimized Feature Selection and Weighting Schema for Category Ranking; Challenges and Solutions for Hierarchical Task Network Planning in E-Learning; Invited Talks; Artificial Intelligence and Unmanned Aerial Vehicles; Writing a Good Grant Proposal; Author Index…”
    Full text (MFA users only)
    Electronic eBook
  19. 179

    Introduction to graph theory by Voloshin, Vitaly I. (Vitaly Ivanovich), 1954-

    Published 2009
    Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
    Full text (MFA users only)
    Electronic eBook
  20. 180

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
    Full text (MFA users only)
    Electronic eBook