Search Results - (((((((anti OR wanting) OR ken) OR mantis) OR cantor) OR anne) OR warten) OR wanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Artificial intelligence 19
- Machine learning 19
- Data processing 17
- Data mining 13
- artificial intelligence 11
- Mathematical models 10
- Mathematics 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Diseases 9
- methods 9
- Application software 8
- Artificial Intelligence 8
- Development 8
- Technological innovations 8
- Data Mining 7
- Machine Learning 7
- Social aspects 7
- Computer networks 5
- Computer simulation 5
- History 5
- Materials 5
- Neural Networks, Computer 5
- R (Computer program language) 5
- diagnosis 5
- Algorithms 4
- Automatic control 4
- Bioinformatics 4
- Computer graphics 4
- Digital media 4
Search alternatives:
- wanting »
- mantis »
- warten »
-
221
-
222
-
223
Atlas of minimally invasive surgery for lung and esophageal cancer
Published 2017Full text (MFA users only)
Electronic eBook -
224
-
225
-
226
-
227
-
228
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…87 -- 5.1.2 Purpose of Spamming 88 -- 5.1.3 Spam Filters Inputs and Outputs 88 -- 5.2 Content-Based Spam Filtering Techniques 89 -- 5.2.1 Previous Likeness–Based Filters 89 -- 5.2.2 Case-Based Reasoning Filters 89 -- 5.2.3 Ontology-Based E-Mail Filters 90 -- 5.2.4 Machine-Learning Models 90 -- 5.2.4.1 Supervised Learning 90 -- 5.2.4.2 Unsupervised Learning 90 -- 5.2.4.3 Reinforcement Learning 91 -- 5.3 Machine Learning–Based Filtering 91 -- 5.3.1 Linear Classifiers 91 -- 5.3.2 Naïve Bayes Filtering 92 -- 5.3.3 Support Vector Machines 94 -- 5.3.4 Neural Networks and Fuzzy Logics–Based Filtering 94 -- 5.4 Performance Analysis 97 -- 5.5 Conclusion 97 -- References 98 -- 6 Artificial Intelligence in the Cyber Security Environment 101 Jaya Jain -- 6.1 Introduction 102 -- 6.2 Digital Protection and Security Correspondences Arrangements 104 -- 6.2.1 Operation Safety and Event Response 105 -- 6.2.2 AI2 105 -- 6.2.2.1 CylanceProtect 105 -- 6.3 Black Tracking 106 -- 6.3.1 Web Security 107 -- 6.3.1.1 Amazon Macie 108 -- 6.4 Spark Cognition Deep Military 110 -- 6.5 The Process of Detecting Threats 111 -- 6.6 Vectra Cognito Networks 112 -- 6.7 Conclusion 115 -- References 115 -- 7 Privacy in Multi-Tenancy Frameworks Using AI 119 Shweta Solanki -- 7.1 Introduction 119 -- 7.2 Framework of Multi-Tenancy 120 -- 7.3 Privacy and Security in Multi-Tenant Base System Using AI 122 -- 7.4 Related Work 125 -- 7.5 Conclusion 125 -- References 126 -- 8 Biometric Facial Detection and Recognition Based on ILPB and SVM 129 Shubhi Srivastava, Ankit Kumar and Shiv Prakash -- 8.1 Introduction 129 -- 8.1.1 Biometric 131 -- 8.1.2 Categories of Biometric 131 -- 8.1.2.1 Advantages of Biometric 132 -- 8.1.3 Significance and Scope 132 -- 8.1.4 Biometric Face Recognition 132 -- 8.1.5 Related Work 136 -- 8.1.6 Main Contribution 136 -- 8.1.7 Novelty Discussion 137 -- 8.2 The Proposed Methodolgy 139 -- 8.2.1 Face Detection Using Haar Algorithm 139 -- 8.2.2 Feature Extraction Using ILBP 141 -- 8.2.3 Dataset 143 -- 8.2.4 Classification Using SVM 143 -- 8.3 Experimental Results 145 -- 8.3.1 Face Detection 146 -- 8.3.2 Feature Extraction 146 -- 8.3.3 Recognize Face Image 147 -- 8.4 Conclusion 151 -- References 152 -- 9 Intelligent Robot for Automatic Detection of Defects in Pre-Stressed Multi-Strand Wires and Medical Gas Pipe Line System Using ANN and IoT 155 S K Rajesh Kanna, O. …”
Full text (MFA users only)
Electronic eBook -
229
-
230
Nuclear Medicine Imaging: An Encyclopedic Dictionary
Published 2012Full text (MFA users only)
Electronic eBook -
231
Non-alcoholic fatty liver disease : a practical guide
Published 2013Table of Contents: “…Genetic modifiers of fibrogenesis and disease progression -- Conclusions -- Multiple choice questions -- References -- Answers to multiple choice questions -- Chapter 15: NAFLD in children -- Epidemiology -- Natural history -- Signs and symptoms -- Diagnosis -- Liver biopsy -- Blood biomarkers -- Imaging techniques -- Treatment -- Nonpharmacological interventions -- Medications -- Insulin-sensitizing agents -- Hepatoprotective anti-oxidant therapy -- Other therapies -- Conclusions -- Multiple choice questions -- References -- Answers to multiple choice questions -- Chapter 16: The pointy end of the NAFLD iceberg: cirrhosis, portal hypertension, and liver failure -- Disclaimer -- Introduction -- Epidemiology -- Progression of NASH to cirrhosis -- Cryptogenic cirrhosis -- Histopathology of late NAFLD and cirrhosis -- Clinical outcomes of advanced NAFLD and cirrhosis -- Diagnosis and presentation -- Treatment of NAFLD cirrhosis and complications -- Transplant considerations -- Conclusions and future directions -- Multiple choice questions -- References -- Answers to multiple choice questions -- Chapter 17: Non-alcoholic fatty liver disease, hepatocellular cancer, and other cancers -- Incidence and epidemiology of HCC -- Risk factors for HCC -- NAFLD, metabolic syndrome, and HCC -- HCC can develop in noncirrhotic NAFLD -- NAFLD, the metabolic syndrome, and other cancers -- Obesity and cancer -- Diabetes and cancer -- The pathogenesis of HCC in NAFLD -- The management of HCC arising in patients with the metabolic syndrome -- Surveillance -- The diagnosis of HCC -- Staging of HCC -- Treatment options for HCC -- Surgical resection -- Liver transplantation -- Percutaneous treatments -- Transcatheter arterial chemoembolization (TACE) -- Medical management of HCC -- A modified BCLC algorithm for patients with NAFLD and the metabolic syndrome.…”
Full text (MFA users only)
Electronic eBook -
232
Disobedient Aesthetics : Surveillance, Bodies, Control
Published 2024Full text (MFA users only)
Electronic eBook -
233
Networks-on-chip : from implementations to programming paradigms
Published 2014Full text (MFA users only)
Electronic eBook -
234
Millimeter-wave digitally intensive frequency generation in CMOS
Published 2015Full text (MFA users only)
Electronic eBook -
235
Listed Volatility and Variance Derivatives : a Python-based Guide.
Published 2016Full text (MFA users only)
Electronic eBook -
236
PID and predictive control of electrical drives and power supplies using MATLAB/Simulink
Published 2015Table of Contents: “…5.7 Tuning PI Control Systems for Power Converter 147 -- 5.7.1 Overview of the Designs 147 -- 5.7.2 Tuning the Current Controllers 149 -- 5.7.3 Tuning Voltage Controller 150 -- 5.7.4 Experimental Evaluations 154 -- 5.8 Tuning P Plus PI Controllers for Power Converter 157 -- 5.8.1 Design and Sensitivity Functions 157 -- 5.8.2 Experimental Results 158 -- 5.9 Robustness of Power Converter Control System Using PI Current Controllers 159 -- 5.9.1 Variation of Inductance Using PI Current Controllers 160 -- 5.9.2 Variation of Capacitance on Closed-loop Performance 163 -- 5.10 Summary 167 -- 5.10.1 Current Controllers 167 -- 5.10.2 Velocity, Position and Voltage Controllers 168 -- 5.10.3 Choice between P Current Control and PI Current Control 169 -- 5.11 Further Reading 169 -- References 169 -- 6 FCS Predictive Control in d − q Reference Frame 171 -- 6.1 States of IGBT Inverter and the Operational Constraints 172 -- 6.2 FCS Predictive Control of PMSM 175 -- 6.3 MATLAB Tutorial on Real-time Implementation of FCS-MPC 177 -- 6.3.1 Simulation Results 179 -- 6.3.2 Experimental Results of FCS Control 181 -- 6.4 Analysis of FCS-MPC System 182 -- 6.4.1 Optimal Control System 182 -- 6.4.2 Feedback Controller Gain 184 -- 6.4.3 Constrained Optimal Control 185 -- 6.5 Overview of FCS-MPC with Integral Action 187 -- 6.6 Derivation of I-FCS Predictive Control Algorithm 191 -- 6.6.1 Optimal Control without Constraints 191 -- 6.6.2 I-FCS Predictive Controller with Constraints 194 -- 6.6.3 Implementation of I-FCS-MPC Algorithm 196 -- 6.7 MATLAB Tutorial on Implementation of I-FCS Predictive Controller 197 -- 6.7.1 Simulation Results 198 -- 6.8 I-FCS Predictive Control of Induction Motor 201 -- 6.8.1 The Control Algorithm for an Induction Motor 202 -- 6.8.2 Simulation Results 204 -- 6.8.3 Experimental Results 205 -- 6.9 I-FCS Predictive Control of Power Converter 209 -- 6.9.1 I-FCS Predictive Control of a Power Converter 209 -- 6.9.2 Simulation Results 211 -- 6.9.3 Experimental Results 214.…”
Full text (MFA users only)
Electronic eBook -
237
XML for DB2 information integration
Published 2004Table of Contents: “…-- 3.4 Creating an XML schema from a database schema -- 3.4.1 The algorithm.…”
Full text (MFA users only)
Electronic eBook -
238
Ocular therapeutics handbook : a clinical manual
Published 2011Full text (MFA users only)
Electronic eBook -
239
IBM TotalStorage : SAN product, design, and optimization guide
Published 2005Table of Contents: “…SAN design considerations -- 6.1 What do you want to achieve with a SAN? -- 6.1.1 Storage consolidation -- 6.1.2 High availability solutions -- 6.1.3 LAN-free backup -- 6.1.4 Server-free backup -- 6.1.5 Server-less backup -- 6.1.6 Disaster recovery -- 6.1.7 Flexibility -- 6.1.8 Goals -- 6.1.9 Benefits expected -- 6.1.10 TCO/ROI -- 6.1.11 Investment protection -- 6.2 Existing resources needs and planned growth -- 6.2.1 Collecting the data about existing resources -- 6.2.2 Planning for future needs -- 6.2.3 Platforms and storage -- 6.3 Select the core design for your environment -- 6.3.1 Selecting the topology -- 6.3.2 Scalability -- 6.3.3 Performance -- 6.3.4 Redundancy and resiliency -- 6.4 Host connectivity and Host Bus Adapters -- 6.4.1 Selection criteria -- 6.4.2 Multipathing software -- 6.4.3 Storage sizing -- 6.4.4 Management software -- 6.5 Director class or switch technology -- 6.6 General considerations -- 6.6.1 Ports and ASICs -- 6.6.2 Class F.…”
Full text (MFA users only)
Electronic eBook -
240
Penetration testing : a hands-on introduction to hacking
Published 2014Full text (MFA users only)
Electronic eBook