Search Results - (((((((anti OR wants) OR frantin) OR makant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 29
- Artificial intelligence 26
- Machine learning 25
- Mathematics 19
- Mathematical models 18
- Data mining 17
- Algorithms 15
- Technological innovations 15
- algorithms 14
- artificial intelligence 14
- Computer networks 12
- Application software 11
- Development 11
- methods 11
- Computer algorithms 10
- Management 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Artificial Intelligence 9
- Big data 9
- Data Mining 9
- Diseases 9
- Information technology 9
- Social aspects 9
- Computer science 7
- Electronic data processing 7
- Machine Learning 7
- Materials 7
- Research 7
- Security measures 7
Search alternatives:
-
81
Scientific computing with multicore and accelerators
Published 2010Full text (MFA users only)
Electronic eBook -
82
Analytical modeling of wireless communication systems
Published 2016Table of Contents: “…Safety Message Broadcasting -- Modeling Information Sharing -- Cellular Networks. Multi-RAT Algorithms.…”
Full text (MFA users only)
Electronic eBook -
83
What intelligence tests miss : the psychology of rational thought
Published 2009Table of Contents: “…Inside George W. Bush's mind : hints at what IQ tests miss -- Dysrationalia : separating rationality and intelligence -- The reflective mind, the algorithmic mind, and the autonomous mind -- Cutting intelligence down to size -- Why intelligent people doing foolish things is no surprise -- The cognitive miser : ways to avoid thinking -- Framing and the cognitive miser -- Myside processing : heads I win, tails I win too! …”
Full text (MFA users only)
Electronic eBook -
84
Intelligent Technologies : From Theory to Applications - The New Trends in Computational Intelligence.
Published 2002Table of Contents: “…Neural Networks; Superconvergence Concept in Machine Learning; Application of the Parallel Population Learning Algorithm to Training Feed-forward ANN; Markovian Architectural Bias of Recurrent Neural Networks; SOFM Training Speedup; Generalized Forecasting Sigma-Pi Neural Network; Human Centered Intelligent Robots Using "Ontological Neural Network"; Trajectory Bounds of Solutions of Delayed Cellular Neural Networks Differential Systems; From Plain to Modular Topology: Automatic Modularization of Structured ANNs.…”
Full text (MFA users only)
Electronic eBook -
85
Handbook of Mathematical Induction.
Published 2014Table of Contents: “…Chapter 14: Logic and languageChapter 15: Graphs; Chapter 16: Recursion and algorithms; Chapter 17: Games and recreations; Chapter 18: Relations and functions; Chapter 19: Linear and abstract algebra; Chapter 20: Geometry; Chapter 21: Ramsey theory; Chapter 22: Probability and statistics; Part III: Solutions and hints to exercises; Chapter 23: Solutions: Foundations; Chapter 24: Solutions: Inductive techniques applied to the infinite; Chapter 25: Solutions: Paradoxes and sophisms; Chapter 26: Solutions: Empirical induction; Chapter 27: Solutions: Identities.…”
Full text (MFA users only)
Electronic eBook -
86
Introduction to graph and hypergraph theory
Published 2009Full text (MFA users only)
Electronic eBook -
87
Artificial intelligence : approaches, tools, and applications
Published 2011Table of Contents: “…EVOLUTIONARY COMPUTING ; 2.1. Genetic Algorithms ; 2.2. Mechanism of a Genetic Algorithm ; 3. …”
Full text (MFA users only)
Electronic eBook -
88
Computational Systems Bioinformatics (Volume 6) : Proceedings of the CSB 2007 Conference.
Published 2007Table of Contents: “…INTRODUCTION; Preprocessing to remove noisy peaks; The anti-symmetric problem; 2. ANALYSIS OF PROBLEMS AND CURRENT ALGORITHMS; 2.1. …”
Full text (MFA users only)
Electronic eBook -
89
-
90
Computers and information processing technologies I : selected, peer reviewed papers from the 2014 International Conference on Computers and Information Processing Technologies (IC...
Published 2014Table of Contents: “…The MPI and OpenMP Implementation of Parallel Algorithm for Generating Mandelbrot SetAdaptive Congestion Control via Dynamic Output Feedback; An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing; An Audio Hiding Algorithm Based on Spline Interpolation and Wavelet Transform; Evaluation Method for Anti-Interference Performance of Measuring Based on Entropy Loss; RE-Based Weighted Distributed Equipment Layout; Algorithms of Mining Maximum Frequent Itemsets Based on Compression Matrix; A Secret Sharing Scheme on Access Structure.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
91
Introduction to identity-based encryption
Published 2008Table of Contents: “…Introduction -- Basic mathematical concepts and properties -- Properties of elliptic curves -- Divisors and the Tate pairing -- Cryptography and computational complexity -- Related cryptographic algorithms -- The Cocks IBE scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchial IBE and master secret sharing -- Calculating pairings.…”
Full text (MFA users only)
Electronic eBook -
92
Data Analytics in Bioinformatics : A Machine Learning Perspective.
Published 2021Table of Contents: “…3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA)…”
Full text (MFA users only)
Electronic eBook -
93
Media smart : lessons, tips and strategies for librarians, classroom instructors and other information professionals
Published 2022Table of Contents: “…Words matter -- Propaganda -- Satire -- Advertising -- Public trust in journalism -- 7. Algorithms, Bots, Trolls, Cyborgs and Artificial Intelligence -- Algorithms -- Bots, trolls, cyborgs and other inauthentic activity -- 8. …”
Full text (MFA users only)
Electronic eBook -
94
Artificial Intelligence in Semiconductor Industry - Materials to Applications.
Published 2021Table of Contents: “…Cover -- Guest editorial -- Efficient VLSI architecture for FIR filter design using modified differential evolution ant colony optimization algorithm -- Optimized DA-reconfigurable FIR filters for software defined radio channelizer applications -- Grid -- connected operation and performance of hybrid DG having PV and PEMFC -- High speed data encryption technique with optimized memory based RSA algorithm for communications -- A 10-bit 200 MS/s pipelined ADCwith parallel sampling and switched op-amp sharing technique…”
Full text (MFA users only)
Electronic eBook -
95
Media technologies : essays on communication, materiality, and society
Published 2014Table of Contents: “…Bowker -- "What Do We Want?" "Materiality!" "When Do We Want It?" "Now!" …”
Full text (MFA users only)
Electronic eBook -
96
Agent-based computing
Published 2010Table of Contents: “…Analysis of Algorithm -- 2.1.1. Chain-Like Agent Structure -- 2.1.2. …”
Full text (MFA users only)
Electronic eBook -
97
Advances in Knowledge-Based and Intelligent Engineering and Information Systems
Published 2018Full text (MFA users only)
Electronic eBook -
98
Introduction to network security : theory and practice
Published 2015Table of Contents: “…Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index.…”
Full text (MFA users only)
Electronic eBook -
99
Future Farming.
Published 2023Table of Contents: “…PROPOSED METHODOLOGY -- Pre-processing -- Leaf Image from Plants -- Segmentation Model Using Improved Canny Algorithm -- Steps of Improved Canny Algorithm -- Leaf Image Feature Selection Using Hybrid Black Widow Optimization Algorithm with Mayfly Optimization Algorithm (BWO-MA) -- Pseudo-Code of the Hybrid (BWO-MA) Algorithm -- Output: Objective Function's -RMSE -- Leaf Image Classification Using (BWO-MA) with ANN -- Hyper-Parameter Tuning With (BWO-MA) -- RESULT AND DISCUSSION -- Dataset Description -- Evaluation & Results -- CONCLUSION -- REFERENCES…”
Full text (MFA users only)
Electronic eBook -
100
Rough fuzzy image analysis : foundations and methodologies
Published 2010Table of Contents: “…1. Cantor, fuzzy, near, and rough sets in image analysis / James F. …”
Full text (MFA users only)
Electronic eBook