Search Results - (((((((anti OR mantis) OR wants) OR makant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 29
- Artificial intelligence 26
- Machine learning 25
- Mathematics 19
- Mathematical models 18
- Data mining 17
- Algorithms 15
- Technological innovations 15
- algorithms 14
- artificial intelligence 14
- Computer networks 12
- Application software 11
- Development 11
- methods 11
- Computer algorithms 10
- Management 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Artificial Intelligence 9
- Big data 9
- Data Mining 9
- Diseases 9
- Information technology 9
- Social aspects 9
- Computer science 7
- Electronic data processing 7
- Machine Learning 7
- Materials 7
- Research 7
- Security measures 7
Search alternatives:
- mantis »
- wants »
- makant »
-
201
Advanced Analytics with R and Tableau.
Published 2016Table of Contents: “…; How to do Clustering in Tableau; Creating Clusters; Clustering example in Tableau; Creating a Tableau group from cluster results; Constraints on saving Clusters; Interpreting your results; How Clustering Works in Tableau; The clustering algorithm; Scaling; Clustering without using k-means; Hierarchical modeling; Statistics for Clustering; Describing Clusters -- Summary tab; Testing your Clustering.…”
Full text (MFA users only)
Electronic eBook -
202
Visible Business : Uncover the Blindspots and Engage the World's Female Economy.
Published 2017Table of Contents: “…Blind Spots; Contents; Foreword; About the Author; Acknowledgements; To my community; To my village; Preface; Introduction; Chapter 1 From history to herstory; The birth of business marketing; Things have changed -- or have they?; Women want more; The wo-man algorithm; Become conscious of the bias; From reject to results; Chapter 2 Are you blind?…”
Full text (MFA users only)
Electronic eBook -
203
Challenges and opportunities of HealthGrids : proceedings of Healthgrid 2006
Published 2006Table of Contents: “…Early Diagnosis of Alzheimer's Disease Using a Grid Implementation of Statistical Parametric Mapping AnalysisUsing the Grid to Analyze the Pharmacokinetic Modelling After Contrast Administration in Dynamic MRI; Medical Image Registration Algorithms Assessment: Bronze Standard Application Enactment on Grids Using the MOTEUR Workflow Engine; Ethical, Legal and Privacy Issues on HealthGrids; The Ban on Processing Medical Data in European Law: Consent and Alternative Solutions to Legitimate Processing of Medical Data in HealthGrid.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
204
-
205
Introduction to Modern Algebra and Its Applications.
Published 2020Full text (MFA users only)
Electronic eBook -
206
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
Full text (MFA users only)
Electronic eBook -
207
Chemical, mechanical and materials engineering : selected, peer reviewed papers from the 2011 International Conference on Chemical, Mechanical and Materials Engineering (CMME2011),...
Published 2011Table of Contents: “…Preparation and Exothermic Characterization of Dioctyl Sebacate (DOS)-Coated Aluminum NanopowdersApplication of Genetic Algorithm in Chemical Reaction Kinetics; Molten Slag Structure and Diffusion Coefficients of Cr3+ and Si4+ during Micro-Carbon Cr-Fe Alloy Production; Dynamic Crushing of Hexagonal Honeycombs under In-Plane Loading; Application of LOD Technology in the 3DVR Remote Control Platform for Shearer; Bearing Fault Diagnosis Based on Probability Boxes Theory and SVM Method; Study on Industry Process of the Rubber Anti-Oxidant RD…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
208
The generative and the structuralist approach to the syllable : a comparative analysis of English and Slovak
Published 2016Table of Contents: “…The Analysis; 3.2.2 The Syllable Structure Algorithm in Slovak; 3.2.2.1. Some Special Issues of Slovak Phonology; 3.2.2.1.1 Is Slovak ' j' a glide?…”
Full text (MFA users only)
Electronic eBook -
209
Handbook of operations research in natural resources
Published 2007Full text (MFA users only)
Electronic eBook -
210
Digital journalism, drones, and automation : the language and abstractions behind the news
Published 2020Full text (MFA users only)
Electronic eBook -
211
Better living through economics
Published 2010Table of Contents: “…Introduction / John J Siegfried -- Overview: Highlights of the benefits of basic science in economics / Charles R Plott -- Comment / Daniel S Hamermesh -- Comment / Daniel Newlon -- 1: Evolution of emissions trading / Thomas H Tietenberg -- Comment / Wallace E Oates -- 2: Better living through improved price indexes / Michael J Boskin -- Comment / Jerry Hausman -- 3: Economics and the earned income tax credit / Robert A Moffitt -- Comment / V Joseph Hotz -- 4: Trade liberalization and growth in developing countries / Anne O Krueger -- Comment / Douglas A Irwin -- 5: Role of economics in the welfare-to-work reforms of the 1990s / Rebecca M Blank -- Comment / Nancy Folbre -- 6: Better living through monetary economics / John B Taylor -- Comment Laurence H Meyer -- 7: Greatest auction in history / R Preston McAfee, John McMillan, Simon Wilkie -- Comment / Jeremy Bulow -- 8: Air-transportation deregulation / Elizabeth E Bailey -- Comment / Nancy L Rose -- 9: Deferred-acceptance algorithms: history, theory, practice / Alvin E Roth -- Comment / Peter Cramton -- 9: Economics, economists, and antitrust: a tale of growing influence / Lawrence J White -- Comment / Kenneth G Elzinga -- 11: Economics and the all-volunteer military force / Beth J Asch, James C Miller III, John T Warner -- Comment / Walter Y Oi -- 12: Public policy and saving for retirement: the autosave features of the Pension Protection Act of 2006 / John Beshears [and others] -- Comment / Robert J Shiller -- Contributors -- Index.…”
Full text (MFA users only)
Electronic eBook -
212
Sensors, mechatronics and automation : selected, peer reviewed papers from the 2013 International Conference on Sensors, Mechatronics and Automation (ICSMA 2013), December 24-25, 2...
Published 2014Full text (MFA users only)
Electronic Conference Proceeding eBook -
213
Mechanical, Electronic and Information Technology Engineering
Published 2015Table of Contents: “…An Approach for the Implementation of Intelligent PID Controller Based on Fast Genetic Algorithm; Research of Large Erecting Control System Based on Fuzzy PID Control Algorithm; An Investigation of Undulating Shape Adaptation Characteristics of a Hydraulic-Driven Bionic Undulating Robot; Wireless Monitoring and Controlling Marine Navigation Parameters; Research on PCS Real-Time System Based on Integrated Control and Simulation; Rapid Design of DC Motor Speed Control System Based on MATLAB.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
214
Conversations on violence : an anthology
Published 2021Table of Contents: “…What Does an Anti-Fascist Life Feel Like? -- Natasha Lennard -- 16. …”
Full text (MFA users only)
Electronic eBook -
215
Towards 5G : Applications, Requirements and Candidate Technologies.
Published 2016Table of Contents: “…4.5.4 A System View of€Interference Management: Radio Circuits, PHY€Mechanisms, and€Protocol Designs4.5.5 Dynamic Cloud Services Spectrum Sharing Algorithms and€Mechanisms for€B4G Networks; 4.5.6 Fundamentals of Spectrum Sharing in Device-to-Device and Heterogeneous Communication Networks ; 4.5.7 Structured Sharing of€Network and€Compute Resources in€a€Community of€Devices; 4.5.8 A Unified Framework for Enabling Energy-efficient Mobile Internet Apps and Energy-efficient Cloud Offloading ; References; Part II Candidate Technologies -- Evolutionary ; Chapter 5 Towards Green and Soft.…”
Full text (MFA users only)
Electronic eBook -
216
Compressed sensing : theory and applications
Published 2012Full text (MFA users only)
Electronic eBook -
217
-
218
Lead generation for dummies
Published 2014Table of Contents: “…Creating an Internal Blogging ProgramChapter 9: Creating Lasting Relationships Through Social Media; Sharing on Social Media; Getting the Most out of Facebook; Leveraging Twitter; Engaging Through LinkedIn; Building Your Google+ Presence; Getting Visual with Pinterest; Attracting Attention with SlideShare; Chapter 10: Getting Found Through Search Engine Optimization; Maximizing Different Traffic Sources; Knowing Your Search Engines; Making the Most out of Google Algorithm Updates; Choosing Your Keywords; Perfecting On-Page SEO; Utilizing Links in a Natural Way.…”
Full text (MFA users only)
Electronic eBook -
219
Topology '90
Published 1992Table of Contents: “…(p-1)/2Tangles in Prisms, Tangles in Cobordisms -- A Computational Algorithm of Spectral Flow in Floer Homology…”
Full text (MFA users only)
Electronic eBook -
220
Global optimization methods in geophysical inversion
Published 2013Table of Contents: “…5.6 Multimodal fitness functions, genetic drift, GA with sharing, and repeat (parallel) GA -- 5.7 Uncertainty estimates -- 5.8 Evolutionary programming -- a variant of GA -- 5.9 Summary -- 6 Other stochastic optimization methods -- 6.1 The neighborhood algorithm (NA) -- 6.1.1 Voronoi diagrams -- 6.1.2 Voronoi diagrams in SA and GA -- 6.1.3 Neighborhood sampling algorithm -- 6.2 Particle swarm optimization (PSO) -- 6.3 Simultaneous perturbation stochastic approximation (SPSA) -- 7 Geophysical applications of simulated annealing and genetic algorithms -- 7.1 1D seismic waveform inversion -- 7.1.1 Application of heat bath SA -- 7.1.2 Application of GAs -- 7.1.3 Real-data examples -- 7.1.4 Hybrid GA/LI inversion using different measures of fitness -- 7.1.5 Hybrid VFSA inversion using different strategies -- 7.2 Prestack migration velocity estimation -- 7.2.1 1D earth structure -- 7.2.2 2D earth structure -- 7.2.3 Multiple and simultaneous VFSA for imaging -- 7.3 Inversion of resistivity sounding data for 1D earth models -- 7.3.1 Exact parameterization -- 7.3.2 Overparameterization with smoothing -- 7.4 Inversion of resistivity profiling data for 2D earth models -- 7.4.1 Inversion of synthetic data -- 7.4.2 Inversion of field data -- 7.5 Inversion of magnetotelluric sounding data for 1D earth models -- 7.6 Stochastic reservoir modeling -- 7.7 Seismic deconvolution by mean field annealing (MFA) and Hopfield network -- 7.7.1 Synthetic example -- 7.7.2 Real-data example -- 7.8 Joint inversion -- 7.8.1 Joint travel time and gravity inversion -- 7.8.2 Time-lapse (4D) seismic and well production joint inversion -- 8 Uncertainty estimation -- 8.1 Methods of numerical integration -- 8.1.1 Grid search or enumeration -- 8.1.2 Monte Carlo integration -- 8.1.3 Importance sampling -- 8.1.4 Multiple MAP estimation -- 8.2 Simulated annealing: the Gibbs sampler.…”
Full text (MFA users only)
Electronic eBook