Search Results - (((((((anti OR manthe) OR find) OR mantic) OR cantor) OR anne) OR halted) OR granting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 44
- Artificial intelligence 29
- Machine learning 26
- Mathematical models 26
- Mathematics 22
- Data mining 20
- algorithms 18
- artificial intelligence 18
- methods 18
- Algorithms 16
- Diseases 16
- Research 16
- Computer networks 15
- Computer algorithms 14
- Management 12
- Technological innovations 12
- diagnosis 12
- Signal processing 11
- Social aspects 11
- Artificial Intelligence 10
- Digital techniques 10
- Mathematical optimization 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- R (Computer program language) 10
- Security measures 10
- Big data 9
- Bioinformatics 9
- Image processing 9
- Information technology 9
Search alternatives:
- manthe »
- find »
- mantic »
- halted »
- granting »
-
121
Advances in Knowledge-Based and Intelligent Engineering and Information Systems
Published 2018Full text (MFA users only)
Electronic eBook -
122
Calculating the Secrets of Life : Contributions of the Mathematical Sciences to Molecular Biology.
Published 1994Table of Contents: “…Efficient AlgorithmsStatistical Significance; Excursion: Susceptibility to Colon Cancer in Mice and the Large Deviation Theory of Diffusion Processes; PHYSICAL MAPPING; Assembling Physical Maps by ""Fingerprinting"" Random Clones; Excursion: Designing a Strategy to Map the Human Genome; CONCLUSION; REFERENCES; Chapter 3 Seeing Conserved Signals: Using Algorithms to Detect Similarities between Biosequences ; FINDING GLOBAL SIMILARITIES; Visualizing Alignments: Edit Graphs; The Basic Dynamic Programming Algorithm; FINDING LOCAL SIMILARITIES; VARIATIONS ON SEQUENCE COMPARISON.…”
Full text (MFA users only)
Electronic eBook -
123
Introduction to network security : theory and practice
Published 2015Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
Full text (MFA users only)
Electronic eBook -
124
Emitter detection and geolocation for electronic warfare
Published 2020Table of Contents: “…6.2 MAXIMUM LIKELIHOOD ESTIMATION -- 6.3 OTHER ESTIMATORS -- 6.3.1 Minimum Variance Unbiased Estimators -- 6.3.2 Bayes Estimators -- 6.3.3 Least Square Estimators -- 6.3.4 Convex Estimators -- 6.3.5 Tracking Estimators -- 6.4 PERFORMANCE MEASURES -- 6.4.1 Root Mean Squared Error (RMSE) -- 6.4.2 CRLB -- 6.4.3 Angle Error Variance and Confidence Intervals -- 6.5 PROBLEM SET -- References -- Chapter 7 Direction-Finding Systems -- 7.1 BEAM PATTERN-BASED DIRECTION FINDING -- 7.1.1 Implementation -- 7.1.2 Performance -- 7.2 WATSON-WATT DIRECTION FINDING -- 7.2.1 Implementation -- 7.2.2 Performance…”
Full text (MFA users only)
Electronic eBook -
125
Quantum Computation And Quantum Information Theory : Reprint Volume with Introductory Notes for ISI TMR Network School.
Published 2001Table of Contents: “…2.4 Going Beyond Bell's Theorem 2.5 What is Wrong with These Elements of Reality -- 2.6 Observation of Three-Photon Greenberger-Horne-Zeilinger Entanglement -- Quantum Algorithms -- 3. Quantum Algorithms -- 3.1 An Overview of Quantum Computing -- 3.2 On Quantum Algorithms…”
Full text (MFA users only)
Electronic eBook -
126
-
127
-
128
Future Farming.
Published 2023Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
129
Learning Boost C++ libraries : solve practical programming problems using powerful, portable, and expressive libraries from Boost
Published 2015Table of Contents: “…Shared ownership semanticsboost::shared_ptr and std::shared_ptr; Intrusive smart pointers -- boost::intrusive_ptr; shared_array; Managing non-memory resources using smart pointers; Self-test questions; Summary; References; Chapter 4: Working with Strings; Text processing with Boost String Algorithms library; Using Boost String Algorithms; Find algorithms; Case-conversion and trimming algorithms; The replace and erase algorithms; The split and join algorithms; Splitting text using the Boost Tokenizer library; Tokenizing based on separators…”
Full text (MFA users only)
Electronic eBook -
130
Rough fuzzy image analysis : foundations and methodologies
Published 2010Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
Full text (MFA users only)
Electronic eBook -
131
Ivor Horton's beginning Visual C++ 2012
Published 2012Table of Contents: “…Finding the Length of a Null-Terminated String --…”
Full text (MFA users only)
Electronic eBook -
132
Advances in nonlinear waves and symbolic computation
Published 2009Table of Contents: “…Senthilnathan [and others] -- Direct methods and symbolic software for conservation laws of nonlinear equations / Willy Hereman [and others] -- Nonclassical potential symmetries for a nonlinear thermal wave equation / M.L. Gandarias -- Anti-dark solitons of the resonant nonlinear Schrödinger equation / D.W.C. …”
Full text (MFA users only)
Electronic eBook -
133
Artificial Intelligence and Machine Learning Fundamentals : Develop Real-World Applications Powered by the Latest AI Advances.
Published 2018Table of Contents: “…Uninformed and Informed SearchCreating Heuristics; Admissible and Non-Admissible Heuristics; Heuristic Evaluation; Exercise 5: Tic-Tac-Toe Static Evaluation with a Heuristic Function; Using Heuristics for an Informed Search; Types of Heuristics; Pathfinding with the A* Algorithm; Exercise 6: Finding the Shortest Path to Reach a Goal; Exercise 7: Finding the Shortest Path Using BFS; Introducing the A* Algorithm; A* Search in Practice Using the simpleai Library; Game AI with the Minmax Algorithm and Alpha-Beta Pruning; Search Algorithms for Turn-Based Multiplayer Games; The Minmax Algorithm…”
Full text (MFA users only)
Electronic eBook -
134
-
135
Twitter and tear gas : the power and fragility of networked protest
Published 2017Full text (MFA users only)
Electronic eBook -
136
Communication System Security.
Published 2012Table of Contents: “…Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. …”
Full text (MFA users only)
Electronic eBook -
137
Structured Matrices in Mathematics, Computer Science, and Engineering.
Published 2001Table of Contents: “…Contents -- Foreword -- Part V. Fast Algorithms -- The Schur algorithm for matrices with Hessenberg displacement structure -- Fast inversion algorithms for a class of block structured matrices -- A fast and stable solver for recursively semi-separable systems of linear equations -- Part VI. …”
Full text (MFA users only)
Full text (MFA users only)
Electronic eBook -
138
-
139
Just Enough R! : an Interactive Approach to Machine Learning and Analytics.
Published 2020Full text (MFA users only)
Electronic eBook -
140