Search Results - (((((((anti OR hands) OR granting) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 37
- Artificial intelligence 35
- Machine learning 31
- Mathematical models 29
- Mathematics 22
- artificial intelligence 21
- Algorithms 20
- Data mining 18
- algorithms 17
- Technological innovations 16
- Computer networks 15
- Computer algorithms 13
- Diseases 13
- Management 13
- methods 13
- Artificial Intelligence 12
- Digital techniques 12
- Signal processing 12
- Big data 11
- Computer security 11
- Development 11
- Security measures 11
- Social aspects 11
- Application software 10
- Information technology 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Research 10
- Computer science 8
- Computer simulation 8
Search alternatives:
-
161
Continuing Kepler's Quest : Assessing Air Force Space Command's Astrodynamics Standards
Published 2012Full text (MFA users only)
Electronic eBook -
162
DSP with Python Programming.
Published 2017Table of Contents: “…Gaussian linear case: Kalman algorithm; 3.5. Discrete finite Markov case; 4 Monte-Carlo Methods; 4.1. …”
Full text (MFA users only)
Electronic eBook -
163
Simulation and Modeling Related to Computational Science and Robotics Technology.
Published 2012Table of Contents: “…Teleoperation of Universal Robot Hand with Pinching Force StabilizationObject Manipulation Based on Tactile Information of Multi-Fingered Robot Hand; Displacement and Force Measurement, Vibration Detection by Magnetic Type Tactile Sensor; Applications; Saliency-Based Geographics Annotation for Robotic Access to Naturally Complex Scenes; Monitoring Method for Underground Condition; Exact Pipe Wall Thinning Management with Flow Accelerated Corrosion Using Electro-Magnetic Acoustic Transducer; Subject Index; Author Index…”
Full text (MFA users only)
Electronic eBook -
164
Nonunions : diagnosis, evaluation and management
Published 2018Full text (MFA users only)
Electronic eBook -
165
Advanced Printing and Packaging Materials and Technologies
Published 2015Table of Contents: “…An Automatic Calculation Method of MTF and the Application in Blurred Images Restoration; An Image Anti-Forgery Algorithm Based on Conceal Zone Special Halftoning; An Improved Print-Scan Resistant Watermarking Scheme; Research on the Character and Line Quality Evaluation Model Based on Human Visual System; Researches on Text Image Watermarking Scheme Based on the Structure of Character Glyph; A Novel Approach of Edge Detection Based on Gray Correlation Degree and Kirsch Operator; A Novel Digital Watermark Algorithm Based on a Fingerprint Image.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
166
Focus on artificial neural networks
Published 2011Table of Contents: “…ARTIFICIAL NEURAL NETWORKS (ANNS) -- 3. MICROEMULSIONS -- 4. APPLICATION OF ANNS IN THE DEVELOPMENT OF MICROEMULSION DRUG DELIVERY SYSTEMS -- 4.1. …”
Full text (MFA users only)
Electronic eBook -
167
Big Data and HPC.
Published 2018Table of Contents: “…Analysis and Design of IoT Based Physical Location Monitoring SystemAutonomous Task Scheduling for Fast Big Data Processing; Adaptive Resource Management for Distributed Data Analytics; HPC Challenges; High-Performance Massive Subgraph Counting Using Pipelined Adaptive-Group Communication; Final Parallel and Distributed Computing Assignment for Master Students: Description of the Properties and Parallel Structure of Algorithms; Parallel Motion Estimation Based on GPU and Combined GPU-CPU; GPU-Based Iterative Hill Climbing Algorithm to Solve Symmetric Traveling Salesman Problem.…”
Full text (MFA users only)
Electronic eBook -
168
Industrial control systems
Published 2011Table of Contents: “…EXTRACTIVE FERMENTATION PROCESS FOR BIOETHANOL PRODUCTION ; 3. PLANT MODEL BASED ON ANN ; 3.1. ANN Configurations.…”
Full text (MFA users only)
Electronic eBook -
169
Automata and Computability.
Published 1997Table of Contents: “…Miscellaneous Exercises Turing Machines and Effective ComputabilityHints for Selected Miscellaneous Exercises; Solutions to Selected Miscellaneous Exercises; References; Notation and Abbreviations; Index.…”
Full text (MFA users only)
Electronic eBook -
170
Media Backends : Digital Infrastructures and Sociotechnical Relations.
Published 2023Full text (MFA users only)
Electronic eBook -
171
Data Science : The Executive Summary - a Technical Book for Non-Technical Professionals.
Published 2020Table of Contents: “…Chapter 3 Working with Modern Data -- 3.1 Unstructured Data and Passive Collection -- 3.2 Data Types and Sources -- 3.3 Data Formats -- 3.3.1 CSV Files -- 3.3.2 JSON Files -- 3.3.3 XML and HTML -- 3.4 Databases -- 3.4.1 Relational Databases and Document Stores -- 3.4.2 Database Operations -- 3.5 Data Analytics Software Architectures -- 3.5.1 Shared Storage -- 3.5.2 Shared Relational Database -- 3.5.3 Document Store + Analytics RDB -- 3.5.4 Storage + Parallel Processing -- Chapter 4 Telling the Story, Summarizing Data -- 4.1 Choosing What to Measure…”
Full text (MFA users only)
Electronic eBook -
172
Electromagnetic well logging : models for MWD/LWD interpretation and tool design
Published 2014Full text (MFA users only)
Electronic eBook -
173
Learning Geospatial Analysis with Python - Second Edition.
Published 2015Full text (MFA users only)
Electronic eBook -
174
Routledge Handbook of Arabic Translation
Published 2019Table of Contents: “…The Arabic-IPA mapping algorithm and transcription tool: overviewThe SALMA Tagger; The two-stage mapping algorithm: SALMA pre-processing; The two-stage mapping algorithm: the rule-development stage; Further challenges and examples in full-form Arabic-IPA transcription; Automatically generated syllabified IPA transcriptions of Arabic words; Automatic assignment of primary stress; Automating stress assignment in pause form pronunciation; The tajwīd concept of prolongation or madd; Evaluation of automatic stress assignment over Quranic Arabic; Measuring inter-annotator agreement…”
Full text (MFA users only)
Electronic eBook -
175
-
176
Learning OpenCV 3 Application Development.
Published 2016Full text (MFA users only)
Electronic eBook -
177
-
178
Stairs 2006 : Proceedings of the Third Starting AI Researchers' Symposium
Published 2006Table of Contents: “…A Comparison of Two Machine-Learning Techniques to Focus the Diagnosis TaskArgumentation Semantics for Temporal Defeasible Logic; NEWPAR: An Optimized Feature Selection and Weighting Schema for Category Ranking; Challenges and Solutions for Hierarchical Task Network Planning in E-Learning; Invited Talks; Artificial Intelligence and Unmanned Aerial Vehicles; Writing a Good Grant Proposal; Author Index…”
Full text (MFA users only)
Electronic eBook -
179
Introduction to graph theory
Published 2009Table of Contents: “…What Is Mathematical Induction; 7.2. Graph Theory Algorithms and Their Complexity; 7.3. Answers and Hints to Selected Exercises; 7.4. …”
Full text (MFA users only)
Electronic eBook -
180
Data and Application Security : Developments and Directions
Published 2002Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management -- Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL's Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.…”
Full text (MFA users only)
Electronic eBook