Search Results - (((((((anti OR wanting) OR ken) OR mantis) OR cantor) OR anne) OR warten) OR wanting) algorithms.

  1. 221

    Android Sensor Programming By Example. by Nagpal, Varun

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  2. 222
  3. 223
  4. 224

    Mastering D3.js. by Castillo, Pablo Navarro

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  5. 225

    Creating E-Learning Games with Unity. by Horachek, David

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  6. 226

    Danforth's obstetrics and gynecology.

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  7. 227
  8. 228

    Artificial intelligence and data mining approaches in security frameworks

    Published 2021
    Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
    Full text (MFA users only)
    Electronic eBook
  9. 229
  10. 230
  11. 231

    Non-alcoholic fatty liver disease : a practical guide

    Published 2013
    Table of Contents: “…Genetic modifiers of fibrogenesis and disease progression -- Conclusions -- Multiple choice questions -- References -- Answers to multiple choice questions -- Chapter 15: NAFLD in children -- Epidemiology -- Natural history -- Signs and symptoms -- Diagnosis -- Liver biopsy -- Blood biomarkers -- Imaging techniques -- Treatment -- Nonpharmacological interventions -- Medications -- Insulin-sensitizing agents -- Hepatoprotective anti-oxidant therapy -- Other therapies -- Conclusions -- Multiple choice questions -- References -- Answers to multiple choice questions -- Chapter 16: The pointy end of the NAFLD iceberg: cirrhosis, portal hypertension, and liver failure -- Disclaimer -- Introduction -- Epidemiology -- Progression of NASH to cirrhosis -- Cryptogenic cirrhosis -- Histopathology of late NAFLD and cirrhosis -- Clinical outcomes of advanced NAFLD and cirrhosis -- Diagnosis and presentation -- Treatment of NAFLD cirrhosis and complications -- Transplant considerations -- Conclusions and future directions -- Multiple choice questions -- References -- Answers to multiple choice questions -- Chapter 17: Non-alcoholic fatty liver disease, hepatocellular cancer, and other cancers -- Incidence and epidemiology of HCC -- Risk factors for HCC -- NAFLD, metabolic syndrome, and HCC -- HCC can develop in noncirrhotic NAFLD -- NAFLD, the metabolic syndrome, and other cancers -- Obesity and cancer -- Diabetes and cancer -- The pathogenesis of HCC in NAFLD -- The management of HCC arising in patients with the metabolic syndrome -- Surveillance -- The diagnosis of HCC -- Staging of HCC -- Treatment options for HCC -- Surgical resection -- Liver transplantation -- Percutaneous treatments -- Transcatheter arterial chemoembolization (TACE) -- Medical management of HCC -- A modified BCLC algorithm for patients with NAFLD and the metabolic syndrome.…”
    Full text (MFA users only)
    Electronic eBook
  12. 232
  13. 233
  14. 234
  15. 235
  16. 236

    PID and predictive control of electrical drives and power supplies using MATLAB/Simulink by Wang, Liuping

    Published 2015
    Table of Contents: “…5.7 Tuning PI Control Systems for Power Converter 147 -- 5.7.1 Overview of the Designs 147 -- 5.7.2 Tuning the Current Controllers 149 -- 5.7.3 Tuning Voltage Controller 150 -- 5.7.4 Experimental Evaluations 154 -- 5.8 Tuning P Plus PI Controllers for Power Converter 157 -- 5.8.1 Design and Sensitivity Functions 157 -- 5.8.2 Experimental Results 158 -- 5.9 Robustness of Power Converter Control System Using PI Current Controllers 159 -- 5.9.1 Variation of Inductance Using PI Current Controllers 160 -- 5.9.2 Variation of Capacitance on Closed-loop Performance 163 -- 5.10 Summary 167 -- 5.10.1 Current Controllers 167 -- 5.10.2 Velocity, Position and Voltage Controllers 168 -- 5.10.3 Choice between P Current Control and PI Current Control 169 -- 5.11 Further Reading 169 -- References 169 -- 6 FCS Predictive Control in d − q Reference Frame 171 -- 6.1 States of IGBT Inverter and the Operational Constraints 172 -- 6.2 FCS Predictive Control of PMSM 175 -- 6.3 MATLAB Tutorial on Real-time Implementation of FCS-MPC 177 -- 6.3.1 Simulation Results 179 -- 6.3.2 Experimental Results of FCS Control 181 -- 6.4 Analysis of FCS-MPC System 182 -- 6.4.1 Optimal Control System 182 -- 6.4.2 Feedback Controller Gain 184 -- 6.4.3 Constrained Optimal Control 185 -- 6.5 Overview of FCS-MPC with Integral Action 187 -- 6.6 Derivation of I-FCS Predictive Control Algorithm 191 -- 6.6.1 Optimal Control without Constraints 191 -- 6.6.2 I-FCS Predictive Controller with Constraints 194 -- 6.6.3 Implementation of I-FCS-MPC Algorithm 196 -- 6.7 MATLAB Tutorial on Implementation of I-FCS Predictive Controller 197 -- 6.7.1 Simulation Results 198 -- 6.8 I-FCS Predictive Control of Induction Motor 201 -- 6.8.1 The Control Algorithm for an Induction Motor 202 -- 6.8.2 Simulation Results 204 -- 6.8.3 Experimental Results 205 -- 6.9 I-FCS Predictive Control of Power Converter 209 -- 6.9.1 I-FCS Predictive Control of a Power Converter 209 -- 6.9.2 Simulation Results 211 -- 6.9.3 Experimental Results 214.…”
    Full text (MFA users only)
    Electronic eBook
  17. 237

    XML for DB2 information integration

    Published 2004
    Table of Contents: “…-- 3.4 Creating an XML schema from a database schema -- 3.4.1 The algorithm.…”
    Full text (MFA users only)
    Electronic eBook
  18. 238

    Ocular therapeutics handbook : a clinical manual

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  19. 239

    IBM TotalStorage : SAN product, design, and optimization guide

    Published 2005
    Table of Contents: “…SAN design considerations -- 6.1 What do you want to achieve with a SAN? -- 6.1.1 Storage consolidation -- 6.1.2 High availability solutions -- 6.1.3 LAN-free backup -- 6.1.4 Server-free backup -- 6.1.5 Server-less backup -- 6.1.6 Disaster recovery -- 6.1.7 Flexibility -- 6.1.8 Goals -- 6.1.9 Benefits expected -- 6.1.10 TCO/ROI -- 6.1.11 Investment protection -- 6.2 Existing resources needs and planned growth -- 6.2.1 Collecting the data about existing resources -- 6.2.2 Planning for future needs -- 6.2.3 Platforms and storage -- 6.3 Select the core design for your environment -- 6.3.1 Selecting the topology -- 6.3.2 Scalability -- 6.3.3 Performance -- 6.3.4 Redundancy and resiliency -- 6.4 Host connectivity and Host Bus Adapters -- 6.4.1 Selection criteria -- 6.4.2 Multipathing software -- 6.4.3 Storage sizing -- 6.4.4 Management software -- 6.5 Director class or switch technology -- 6.6 General considerations -- 6.6.1 Ports and ASICs -- 6.6.2 Class F.…”
    Full text (MFA users only)
    Electronic eBook
  20. 240