Search Results - (((((((anti OR wants) OR wanting) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 29
- Artificial intelligence 26
- Machine learning 25
- Mathematics 19
- Mathematical models 18
- Data mining 17
- Algorithms 15
- Technological innovations 15
- algorithms 14
- artificial intelligence 14
- Computer networks 12
- Application software 11
- Development 11
- methods 11
- Computer algorithms 10
- Management 10
- Neural networks (Computer science) 10
- Python (Computer program language) 10
- Artificial Intelligence 9
- Big data 9
- Data Mining 9
- Diseases 9
- Information technology 9
- Social aspects 9
- Computer science 7
- Electronic data processing 7
- Machine Learning 7
- Materials 7
- Research 7
- Security measures 7
Search alternatives:
- wants »
- wanting »
- markant »
-
201
Solving transport problems : towards green logistics
Published 2019Full text (MFA users only)
Electronic eBook -
202
Artificial Neural Network Applications for Software Reliability Prediction.
Published 2017Full text (MFA users only)
Electronic eBook -
203
Artificial intelligent techniques for electric and hybrid electric vehicles
Published 2020Table of Contents: “…2.6 PID Controller -- 2.7 Fuzzy Control -- 2.8 Auto-Tuning Type Fuzzy PID Controller -- 2.9 Genetic Algorithm -- 2.10 Artificial Neural Network-Based Controller -- 2.11 BLDC Motor Speed Controller With ANN-Based PID Controller -- 2.11.1 PID Controller-Based on Neuro Action -- 2.11.2 ANN-Based on PID Controller -- 2.12 Analysis of Different Speed Controllers -- 2.13 Conclusion -- References -- Chapter 3 Optimization Techniques Used in Active Magnetic Bearing System for Electric Vehicles -- 3.1 Introduction -- 3.2 Basic Components of an Active Magnetic Bearing (AMB) -- 3.2.1 Electromagnet Actuator…”
Full text (MFA users only)
Electronic eBook -
204
Medical data privacy handbook
Published 2015Table of Contents: “…Introduction to Medical Privacy -- A survey of anonymization algorithms for electronic health records -- Differentially Private Histogram and Synthetic Data Publication -- Evaluating the Utility of Differential Privacy -- SECRETA -- Putting Statistical Disclosure Control into Practice -- Utility-constrained Electronic Health Record Data Publishing Through Generalization and Disassociation -- Methods to Mitigate Risk of Composition Attack in Independent Data Publications -- Statistical Disclosure Limitation for Health Data -- A Review of Privacy Preserving Mechanisms for Record Linkage -- Application of Privacy Preserving Techniques in Operational Record Linkage Centres -- Privacy Considerations for Health Information Exchanges -- Managing Access Control in Collaborative Processes for Healthcare Applications -- Automating Consent Management Lifecycle for Electronic Healthcare Systems -- e-Health Cloud -- Preserving Genome Privacy in Research Studies -- Private Genome Data Dissemination -- Threats and Solutions for Genomic Data Privacy -- Medical Image Security -- Privacy Considerations and Techniques for Neuroimages -- Data Privacy Issues with RFID in Healthcare -- Privacy Preserving Classification of ECG Signals in Mobile e-Health Applications -- Strengthening Privacy in Healthcare Social Networks -- Privacy Law, Data Sharing Policies, and Medical Data -- HIPAA and Human Error -- De-identification of Unstructured Clinical Data for Patient Privacy Protection -- Challenges in Synthesizing Surrogate PHI in Narrative EMRs -- Building on Principles -- Epilogue.…”
Full text (MFA users only)
Electronic eBook -
205
-
206
Cryptography : protocols, design, and applications
Published 2012Table of Contents: “…Quantum Protocol for Sharing Classical Information; 9.3. Quantum Protocol for Sharing Quantum Information; 10. …”
Full text (MFA users only)
Electronic eBook -
207
Numerical models for submerged breakwaters : coastal hydrodynamics and morphodynamics
Published 2016Table of Contents: “…3 Literature Review and BackgroundReferences; 4 Theories and Methodologies; 4.1 Introduction; 4.2 Traditional Models for Water Waves; 4.3 New Approaches; 4.3.1 Meshless Methods; 4.3.2 Artificial Intelligence Methods; MLP Networks; Back-Propagation Algorithm; Levenberg-Marquardt Algorithm; RBF Networks; References; 5 Mathematical Modeling and Algorithm Development; 5.1 Navier-Stokes Equations; 5.2 The Turbulent Model; 5.3 Initial and Boundary Conditions; 5.4 Shallow Waters; 5.5 The Extended Mild-Slope Equation; 5.6 Boussinesq Equations; 5.7 Smoothed Particles Hydrodynamics.…”
Full text (MFA users only)
Electronic eBook -
208
Automatic Modeling and Fault Diagnosis of Timed Concurrent Discrete Event Systems : Automatische Modellierung und Fehlerdiagnose Zeitlicher Nebenläufiger Ereignisdiskreter Systeme....
Published 2015Table of Contents: “…3.3.3 Precision and Completeness Properties3.3.4 Identification Parameters; 3.4 Timed Distributed Modeling; 3.5 Identification of Timed Distributed Models; 3.5.1 Timed Distributed Identification Approach; 3.5.2 Precision and Completeness Properties; 3.5.3 Discussion on Shared I/Os; 3.6 Identification of Timed Distributed BMS Models; 3.6.1 Data Collection; 3.6.2 Timed Distributed Identification; 4 Partitioning of DES Models; 4.1 Preliminaries; 4.2 Causal Partitioning; 4.2.1 Distance and Causality; 4.2.2 Causal Partitioning Algorithm; 4.3 Optimal Partitioning; 4.3.1 Optimization Approach.…”
Full text (MFA users only)
Electronic eBook -
209
Development of industrial manufacturing : selected, peer reviewed papers from the 2013 2nd International Conference on Sustainable Energy and Environmental Engineering (ICSEEE 2013...
Published 2014Full text (MFA users only)
Electronic Conference Proceeding eBook -
210
Parallel Programming with Python.
Published 2014Table of Contents: “…; Exploring common forms of parallelization; Communicating in parallel programming; Understanding shared state; Understanding message passing; Identifying parallel programming problems; Deadlock; Starvation; Race conditions; Discovering Python's parallel programming tools; The Python threading module; The Python multiprocessing module.…”
Full text (MFA users only)
Electronic eBook -
211
-
212
Digital journalism, drones, and automation : the language and abstractions behind the news
Published 2020Full text (MFA users only)
Electronic eBook -
213
-
214
Hack proofing your network
Published 2002Table of Contents: “…</br><br> Knowing What To Expect in the Rest of This Book</br><br> Understanding the Current Legal Climate</br><br> Summary</br><br> Frequently Asked Questions</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br><br> Client-Side Security Doesn't Work</br><br> You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information</br><br> Malicious Code Cannot Be 100 Percent Protected against</br><br> Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection</br><br> Firewalls Cannot Protect You 100 Percent from Attack</br><br> Social Engineering</br><br> Attacking Exposed Servers</br><br> Attacking the Firewall Directly</br><br> Client-Side Holes</br><br> Any IDS Can Be Evaded</br><br> Secret Cryptographic Algorithms Are Not Secure</br><br> If a Key Is Not Required, You Do Not Have Encryption-You Have Encoding</br><br> Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them</br><br> In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit</br><br> Security through Obscurity Does Not Work</br><br> Summary </br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 3 Classes of Attack</br><br> Introduction</br><br> Identifying and Understanding the Classes of Attack </br><br> Denial of Service</br><br> Information Leakage</br><br> Regular File Access</br><br> Misinformation</br><br> Special File/Database Access</br><br> Remote Arbitrary Code Execution</br><br> Elevation of Privileges</br><br> Identifying Methods of Testing for Vulnerabilities</br><br> Proof of Concept</br><br> Standard Research Techniques</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 4 Methodology</br><br> Introduction</br><br> Understanding Vulnerability Research Methodologies</br><br> Source Code Research</br><br> Binary Research</br><br> The Importance of Source Code Reviews</br><br> Searching Error-Prone Functions</br><br> Reverse Engineering Techniques</br><br> Disassemblers, Decompilers, and Debuggers</br><br> Black Box Testing</br><br> Chips</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 5 Diffing</br><br> Introduction</br><br> What Is Diffing?…”
Full text (MFA users only)
Electronic eBook -
215
Challenges and opportunities of HealthGrids : proceedings of Healthgrid 2006
Published 2006Table of Contents: “…Early Diagnosis of Alzheimer's Disease Using a Grid Implementation of Statistical Parametric Mapping AnalysisUsing the Grid to Analyze the Pharmacokinetic Modelling After Contrast Administration in Dynamic MRI; Medical Image Registration Algorithms Assessment: Bronze Standard Application Enactment on Grids Using the MOTEUR Workflow Engine; Ethical, Legal and Privacy Issues on HealthGrids; The Ban on Processing Medical Data in European Law: Consent and Alternative Solutions to Legitimate Processing of Medical Data in HealthGrid.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
216
Introduction to Modern Algebra and Its Applications.
Published 2020Full text (MFA users only)
Electronic eBook -
217
Chemical, mechanical and materials engineering : selected, peer reviewed papers from the 2011 International Conference on Chemical, Mechanical and Materials Engineering (CMME2011),...
Published 2011Table of Contents: “…Preparation and Exothermic Characterization of Dioctyl Sebacate (DOS)-Coated Aluminum NanopowdersApplication of Genetic Algorithm in Chemical Reaction Kinetics; Molten Slag Structure and Diffusion Coefficients of Cr3+ and Si4+ during Micro-Carbon Cr-Fe Alloy Production; Dynamic Crushing of Hexagonal Honeycombs under In-Plane Loading; Application of LOD Technology in the 3DVR Remote Control Platform for Shearer; Bearing Fault Diagnosis Based on Probability Boxes Theory and SVM Method; Study on Industry Process of the Rubber Anti-Oxidant RD…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
218
The generative and the structuralist approach to the syllable : a comparative analysis of English and Slovak
Published 2016Table of Contents: “…The Analysis; 3.2.2 The Syllable Structure Algorithm in Slovak; 3.2.2.1. Some Special Issues of Slovak Phonology; 3.2.2.1.1 Is Slovak ' j' a glide?…”
Full text (MFA users only)
Electronic eBook -
219
-
220
Handbook of operations research in natural resources
Published 2007Full text (MFA users only)
Electronic eBook