Search Results - (((((((anti OR kwants) OR wantis) OR markant) OR cantor) OR anne) OR share) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 22
- Data processing 21
- Mathematics 17
- Mathematical models 16
- Algorithms 15
- Technological innovations 15
- algorithms 14
- Machine learning 13
- Data mining 11
- artificial intelligence 11
- Computer algorithms 10
- Computer networks 10
- Management 10
- Diseases 9
- Information technology 9
- Big data 8
- Neural networks (Computer science) 8
- Social aspects 8
- Development 7
- Materials 7
- Research 7
- methods 7
- Artificial Intelligence 6
- Bioinformatics 6
- History 6
- Parallel processing (Electronic computers) 6
- Political aspects 6
- Science 6
- Security measures 6
- Wireless communication systems 6
Search alternatives:
-
81
Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...
Published 2014Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
82
Introduction to identity-based encryption
Published 2008Table of Contents: “…Introduction -- Basic mathematical concepts and properties -- Properties of elliptic curves -- Divisors and the Tate pairing -- Cryptography and computational complexity -- Related cryptographic algorithms -- The Cocks IBE scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchial IBE and master secret sharing -- Calculating pairings.…”
Full text (MFA users only)
Electronic eBook -
83
-
84
Data Analytics in Bioinformatics : A Machine Learning Perspective.
Published 2021Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
Full text (MFA users only)
Electronic eBook -
85
Media smart : lessons, tips and strategies for librarians, classroom instructors and other information professionals
Published 2022Table of Contents: “…Expertise, Authority and Credibility -- Experts -- Sharing information -- Evaluating information -- Authority -- How can authority be evaluated? …”
Full text (MFA users only)
Electronic eBook -
86
Artificial Intelligence in Semiconductor Industry - Materials to Applications.
Published 2021Table of Contents: “…Cover -- Guest editorial -- Efficient VLSI architecture for FIR filter design using modified differential evolution ant colony optimization algorithm -- Optimized DA-reconfigurable FIR filters for software defined radio channelizer applications -- Grid -- connected operation and performance of hybrid DG having PV and PEMFC -- High speed data encryption technique with optimized memory based RSA algorithm for communications -- A 10-bit 200 MS/s pipelined ADCwith parallel sampling and switched op-amp sharing technique…”
Full text (MFA users only)
Electronic eBook -
87
Agent-based computing
Published 2010Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
Full text (MFA users only)
Electronic eBook -
88
Advances in Knowledge-Based and Intelligent Engineering and Information Systems
Published 2018Full text (MFA users only)
Electronic eBook -
89
Introduction to network security : theory and practice
Published 2015Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
Full text (MFA users only)
Electronic eBook -
90
Future Farming.
Published 2023Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
91
Rough fuzzy image analysis : foundations and methodologies
Published 2010Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
Full text (MFA users only)
Electronic eBook -
92
Blockchain-based peer-to-peer transactions in energy systems
Published 2023Table of Contents: “…Smart contract-based peer-to-peer energy storage-sharing architecture and algorithm -- 8.3. Smart contract functions for the storage-sharing scheme -- 8.4. …”
Full text (MFA users only)
Electronic eBook -
93
Multi-label dimensionality reduction
Published 2014Table of Contents: “…Cover; Series; Contents; Preface; Symbol Description; Chapter 1: Introduction; Chapter 2: Partial Least Squares; Chapter 3: Canonical Correlation Analysis; Chapter 4: Hypergraph Spectral Learning; Chapter 5: A Scalable Two-Stage Approach for Dimensionality Reduction; Chapter 6: A Shared-Subspace Learning Framework; Chapter 7: Joint Dimensionality Reduction and Classification; Chapter 8: Nonlinear Dimensionality Reduction: Algorithms and Applications; Appendix Proofs; References; Back Cover.…”
Full text (MFA users only)
Electronic eBook -
94
Elements of quantum computation and quantum communication
Published 2013Table of Contents: “…; A brief history of quantum computation and quantum communication Basic Ideas of Classical and Quantum Computational Models and Complexity Classes; Elementary idea of complexity of an algorithm; Turing machine; Circuit model of computation; Computational complexity and related issues Mathematical Tools and Simple Quantum Mechanics Required for Quantum Computing; A little bit of algebra required for quantum computing; A little bit of quantum mechanics; A little more of algebra for quantum computing Quantum Gates and Quantum Circuits; Single qubit gates; Two qubit gates; Three qubit gates; A little more on quantum gates; Quantum circuits; Discussion Quantum Algorithms; Deutsch's algorithm; Deutsch.…”
Full text (MFA users only)
Electronic eBook -
95
Advances in nonlinear waves and symbolic computation
Published 2009Table of Contents: “…Senthilnathan [and others] -- Direct methods and symbolic software for conservation laws of nonlinear equations / Willy Hereman [and others] -- Nonclassical potential symmetries for a nonlinear thermal wave equation / M.L. Gandarias -- Anti-dark solitons of the resonant nonlinear Schrödinger equation / D.W.C. …”
Full text (MFA users only)
Electronic eBook -
96
-
97
Differential algebra and related topics - proceedings of the international workshop.
Published 2002Table of Contents: “…6 Reduction Algorithms 7 Rosenfeld Properties of an Autoreduced Set ; 8 Coherence and Rosenfeld's Lemma ; 9 Ritt-Raudenbush Basis Theorem ; 10 Decomposition Problems ; 11 Component Theorems ; 12 The Low Power Theorem ; Appendix: Solutions and hints to selected exercises ; References…”
Full text (MFA users only)
Electronic eBook -
98
Trends in Functional Programming.
Published 2007Table of Contents: “…Front Cover; Preliminary Pages; Contents; Preface; Proving Termination Using Dependent Types: The Case of Xor-Terms; Proving the Correctness of Algorithmic Debugging for Functional Programs; Systematic Synthesis of Functions; A Purely Functional Implementation of ROBDDs in Haskell; Efficient Interpretation by Transforming Data Types and Patterns to Functions; Object-Oriented Programming in Dependent Type Theory; A Sharing Analysis for SAFE; Memory Usage Improvement Using Runtime Alias Detection; A Model of Functional Programming with Dynamic Compilation and Optimization.…”
Full text (MFA users only)
Electronic eBook -
99
Twitter and tear gas : the power and fragility of networked protest
Published 2017Full text (MFA users only)
Electronic eBook -
100
Communication System Security.
Published 2012Table of Contents: “…Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. …”
Full text (MFA users only)
Electronic eBook