Search Results - (((((((anti OR wanti) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 121

    Intelligent Technologies : From Theory to Applications - The New Trends in Computational Intelligence. by Kvasnicka, V.

    Published 2002
    Table of Contents: “…Neural Networks; Superconvergence Concept in Machine Learning; Application of the Parallel Population Learning Algorithm to Training Feed-forward ANN; Markovian Architectural Bias of Recurrent Neural Networks; SOFM Training Speedup; Generalized Forecasting Sigma-Pi Neural Network; Human Centered Intelligent Robots Using "Ontological Neural Network"; Trajectory Bounds of Solutions of Delayed Cellular Neural Networks Differential Systems; From Plain to Modular Topology: Automatic Modularization of Structured ANNs.…”
    Full text (MFA users only)
    Electronic eBook
  2. 122

    Handbook of Mathematical Induction. by Gunderson, David S.

    Published 2014
    Table of Contents: “…Chapter 14: Logic and languageChapter 15: Graphs; Chapter 16: Recursion and algorithms; Chapter 17: Games and recreations; Chapter 18: Relations and functions; Chapter 19: Linear and abstract algebra; Chapter 20: Geometry; Chapter 21: Ramsey theory; Chapter 22: Probability and statistics; Part III: Solutions and hints to exercises; Chapter 23: Solutions: Foundations; Chapter 24: Solutions: Inductive techniques applied to the infinite; Chapter 25: Solutions: Paradoxes and sophisms; Chapter 26: Solutions: Empirical induction; Chapter 27: Solutions: Identities.…”
    Full text (MFA users only)
    Electronic eBook
  3. 123

    Artificial intelligence : approaches, tools, and applications

    Published 2011
    Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
    Full text (MFA users only)
    Electronic eBook
  4. 124

    Computational Systems Bioinformatics (Volume 6) : Proceedings of the CSB 2007 Conference. by Markstein, Peter

    Published 2007
    Table of Contents: “…INTRODUCTION; Preprocessing to remove noisy peaks; The anti-symmetric problem; 2. ANALYSIS OF PROBLEMS AND CURRENT ALGORITHMS; 2.1. …”
    Full text (MFA users only)
    Electronic eBook
  5. 125

    Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...

    Published 2014
    Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 126

    Introduction to identity-based encryption by Martin, Luther

    Published 2008
    Table of Contents: “…Introduction -- Basic mathematical concepts and properties -- Properties of elliptic curves -- Divisors and the Tate pairing -- Cryptography and computational complexity -- Related cryptographic algorithms -- The Cocks IBE scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchial IBE and master secret sharing -- Calculating pairings.…”
    Full text (MFA users only)
    Electronic eBook
  7. 127

    Integrated and collaborative product development environment : technologies and implementations by Li, W. D.

    Published 2006
    Table of Contents: “…Intelligent Optimisation of Process Planning; 5.1 Intelligent Optimisation Strategies for CAPP Systems; 5.2 Knowledge Representation of Process Plans; 5.2.1 Process plan representation; 5.2.2 Machining cost criteria for process plans; 5.2.3 Precedence constraints; 5.3 A Hybrid GA/SA-based Optimisation Method; 5.3.1 Overview of the algorithm; 5.3.2 Genetic algorithm -- phase 1; 5.3.3 Simulated annealing algorithm -- phase 2; 5.3.4 Constraint handling algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  8. 128

    Knowledge-based Intelligent System. by Jang, Hyejung

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  9. 129

    Data Analytics in Bioinformatics : A Machine Learning Perspective. by Satpathy, Rabinarayan

    Published 2021
    Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
    Full text (MFA users only)
    Electronic eBook
  10. 130

    Media smart : lessons, tips and strategies for librarians, classroom instructors and other information professionals by Burkhardt, Joanna M.

    Published 2022
    Table of Contents: “…Expertise, Authority and Credibility -- Experts -- Sharing information -- Evaluating information -- Authority -- How can authority be evaluated? …”
    Full text (MFA users only)
    Electronic eBook
  11. 131

    Artificial Intelligence in Semiconductor Industry - Materials to Applications. by Wee, Hui-Ming

    Published 2021
    Table of Contents: “…Cover -- Guest editorial -- Efficient VLSI architecture for FIR filter design using modified differential evolution ant colony optimization algorithm -- Optimized DA-reconfigurable FIR filters for software defined radio channelizer applications -- Grid -- connected operation and performance of hybrid DG having PV and PEMFC -- High speed data encryption technique with optimized memory based RSA algorithm for communications -- A 10-bit 200 MS/s pipelined ADCwith parallel sampling and switched op-amp sharing technique…”
    Full text (MFA users only)
    Electronic eBook
  12. 132

    Machine Learning for Mobile : Practical Guide to Building Intelligent Mobile Applications Powered by Machine Learning. by Gopalakrishnan, Revathi

    Published 2018
    Table of Contents: “…Chapter 2: Supervised and Unsupervised Learning AlgorithmsIntroduction to supervised learning algorithms; Deep dive into supervised learning algorithms; Naive Bayes; Decision trees; Linear regression; Logistic regression; Support vector machines; Random forest; Introduction to unsupervised learning algorithms; Deep dive into unsupervised learning algorithms; Clustering algorithms; Clustering methods; Hierarchical agglomerative clustering methods; K-means clustering; Association rule learning algorithm; Summary; References; Chapter 3: Random Forest on iOS; Introduction to algorithms…”
    Full text (MFA users only)
    Electronic eBook
  13. 133

    Can markets compute equilibria? by Monroe, Hunter K.

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  14. 134

    Agent-based computing

    Published 2010
    Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
    Full text (MFA users only)
    Electronic eBook
  15. 135

    Sentient Enterprise The Evolution of Business Decision-making.

    Published 2017
    Table of Contents: “…More "Data Listening"; Setup for Sentience; Chapter 7 The Autonomous Decisioning Platform; Fast-Changing Capabilities; Self-Driving Cars ... and Companies; "System of Systems" Building Blocks for Sentience; Algorithms: A Must-Have for Autonomous Decisioning; Strategically Applying Algorithmic Intelligence in the Enterprise; Algorithmic "Magic."…”
    Full text (MFA users only)
    Electronic eBook
  16. 136
  17. 137

    Urodynamics : a quick pocket guide by Vignoli, Giancarlo

    Published 2016
    Table of Contents: “…The framework of basic science -- Key symptoms analysis and diagnostic algorithms -- Physical examination and laboratory evaluation -- Urodynamic testing: when and which -- Voiding diary and Pad testing -- Non-invasive urodynamics -- Conventional urodynamics-conventional urodynamics in pediatric age -- Electromyogtrahy -- Urethral profilometry -- Videourodynamics -- Ambulatory urodynamics -- Urodynamics of upper urinary tract.…”
    Full text (MFA users only)
    Electronic eBook
  18. 138

    Mount Sinai expert guides. Hepatology

    Published 2014
    Table of Contents: “…Cover; Title page; Copyright page; Contents; List of Contributors; Series Foreword; Preface; Abbreviation List; About the Companion Website; PART 1: Hepatology; CHAPTER 1: Approach to the Patient with Abnormal Liver Tests; Section 1: Background; Definition of disease; Disease classification; Etiology; Pathology/pathogenesis; Section 2: Prevention; Section 3: Diagnosis; Typical presentation; Clinical diagnosis; Laboratory diagnosis; Diagnostic algorithm; Potential pitfalls/common errors made regarding diagnosis of disease; Section 4: Treatment; When to hospitalize…”
    Full text (MFA users only)
    Electronic eBook
  19. 139

    Delphi High Performance : Build fast Delphi applications using concurrency, parallel programming and memory management. by Gabrijelčič, Primož

    Published 2018
    Table of Contents: “…Dynamic record allocationFastMM internals; Memory allocation in a parallel world; Replacing the default memory manager; ScaleMM; TBBMalloc; Fine-tuning SlowCode; Summary; Chapter 5: Getting Started with the Parallel World; Processes and threads; When to parallelize the code?; Most common problems; Never access UI from a background thread; Simultaneous reading and writing; Sharing a variable; Synchronization; Critical sections; Other locking mechanisms; A short note on coding style; Shared data with built-in locking; Interlocked operations; Object life cycle; Communication; Windows messages.…”
    Full text (MFA users only)
    Electronic eBook
  20. 140

    Introduction to network security : theory and practice by Wang, Jie, 1961-

    Published 2015
    Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
    Full text (MFA users only)
    Electronic eBook